Skip to content

Commit 5f66b7e

Browse files
author
Tod Beardsley
committed
Land rapid7#8940, @h00die's second round of desc fixes
One ninja edit along the way as well.
2 parents fc52ef9 + cfbd3c1 commit 5f66b7e

File tree

76 files changed

+87
-87
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+87
-87
lines changed

modules/exploits/multi/http/sysaid_rdslogs_file_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a file upload vulnerability in SysAid Help Desk v14.3 and v14.4.
1919
The vulnerability exists in the RdsLogsEntry servlet which accepts unauthenticated
20-
file uploads and handles zip file contents in a insecure way. By combining both weaknesses,
20+
file uploads and handles zip file contents in an insecure way. By combining both weaknesses,
2121
a remote attacker can accomplish remote code execution. Note that this will only work if the
2222
target is running Java 6 or 7 up to 7u25, as Java 7u40 and above introduces a protection
2323
against null byte injection in file names. This module has been tested successfully on version

modules/exploits/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def initialize(info = {})
2424
Note: You have the option to use the authentication bypass or not since it requires
2525
that the server is rebooted. The password reset will render the authentication useless.
2626
Typically, if an administrator cant login, they will bounce the box. Therefore, this
27-
module performs a heart beat request until the box is bounced and then attempts to login
27+
module performs a heartbeat request until the box is bounced and then attempts to login
2828
and to perform the command injection. This module has been tested on version 2.6.1062r1
2929
of the appliance.
3030
},

modules/exploits/multi/http/uptime_file_upload_2.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ def initialize(info = {})
2121
which can be exploited by exploits/multi/http/uptime_file_upload_1.rb, but it was mitigated
2222
by the vendor.
2323
24-
Although the mitigiation in place will prevent uptime_file_upload_1.rb from working, it
24+
Although the mitigation in place will prevent uptime_file_upload_1.rb from working, it
2525
can still be bypassed and gain privilege escalation, and allows the attacker to upload file
2626
again, and execute arbitrary commands.
2727
},

modules/exploits/multi/http/vtiger_php_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Description' => %q{
1515
vTiger CRM allows an authenticated user to upload files to embed within documents.
1616
Due to insufficient privileges on the 'files' upload folder, an attacker can upload a PHP
17-
script and execute aribtrary PHP code remotely.
17+
script and execute arbitrary PHP code remotely.
1818
1919
This module was tested against vTiger CRM v5.4.0 and v5.3.0.
2020
},

modules/exploits/multi/http/vtiger_soap_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'vTiger CRM SOAP AddEmailAttachment Arbitrary File Upload',
1818
'Description' => %q{
19-
vTiger CRM allows an user to bypass authentication when requesting SOAP services.
19+
vTiger CRM allows a user to bypass authentication when requesting SOAP services.
2020
In addition, arbitrary file upload is possible through the AddEmailAttachment SOAP
2121
service. By combining both vulnerabilities an attacker can upload and execute PHP
2222
code. This module has been tested successfully on vTiger CRM v5.4.0 over Ubuntu

modules/exploits/multi/http/webpagetest_upload_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
'Description' => %q{
1515
This module exploits a vulnerability found in WebPageTest's Upload Feature. By
1616
default, the resultimage.php file does not verify the user-supplied item before
17-
saving it to disk, and then places this item in the web directory accessable by
17+
saving it to disk, and then places this item in the web directory accessible by
1818
remote users. This flaw can be abused to gain remote code execution.
1919
},
2020
'License' => MSF_LICENSE,

modules/exploits/multi/http/wikka_spam_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
'Description' => %q{
1515
This module exploits a vulnerability found in WikkaWiki. When the spam logging
1616
feature is enabled, it is possible to inject PHP code into the spam log file via the
17-
UserAgent header , and then request it to execute our payload. There are at least
17+
UserAgent header, and then request it to execute our payload. There are at least
1818
three different ways to trigger spam protection, this module does so by generating
1919
10 fake URLs in a comment (by default, the max_new_comment_urls parameter is 6).
2020

modules/exploits/multi/http/x7chat2_php_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Name' => 'X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution',
1515
'Description' => %q{
1616
This module exploits a post-auth vulnerability found in X7 Chat versions
17-
2.0.0 up to 2.0.5.1. The vulnerable code exists on lib/message.php, which
17+
2.0.0 up to 2.0.5.1. The vulnerable code exists on lib/message.php, which
1818
uses preg_replace() function with the /e modifier. This allows a remote
1919
authenticated attacker to execute arbitrary PHP code in the remote machine.
2020
},

modules/exploits/multi/http/zabbix_script_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ def initialize(info={})
1414
'Description' => %q{
1515
ZABBIX allows an administrator to create scripts that will be run on hosts.
1616
An authenticated attacker can create a script containing a payload, then a host
17-
with an IP of 127.0.0.1 and run the abitrary script on the ZABBIX host.
17+
with an IP of 127.0.0.1 and run the arbitrary script on the ZABBIX host.
1818
19-
This module was tested againt Zabbix v2.0.9.
19+
This module was tested against Zabbix v2.0.9.
2020
},
2121
'License' => MSF_LICENSE,
2222
'Author' =>

modules/exploits/multi/http/zenworks_control_center_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Name' => 'Novell ZENworks Configuration Management Remote Execution',
1717
'Description' => %q{
1818
This module exploits a code execution flaw in Novell ZENworks Configuration
19-
Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control
19+
Management 10 SP3 and 11 SP2. The vulnerability exists in the ZENworks Control
2020
Center application, allowing an unauthenticated attacker to upload a malicious file
2121
outside of the TEMP directory and then make a second request that allows for
2222
arbitrary code execution. This module has been tested successfully on Novell

0 commit comments

Comments
 (0)