Skip to content

Commit 5fac151

Browse files
committed
Merge pull request rapid7#3667 from todb-r7/fix-release
Release fixes: Minor caps, grammar, desc fixes
2 parents 6792ded + cad2814 commit 5fac151

File tree

6 files changed

+17
-7
lines changed

6 files changed

+17
-7
lines changed

modules/auxiliary/analyze/jtr_postgres_fast.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ def run
6464
print_status line.chomp
6565
end
6666

67-
print_status "Cracked Passwords this run:"
67+
print_status "Cracked passwords this run:"
6868
cracker_instance.each_cracked_password do |password_line|
6969
password_line.chomp!
7070
next if password_line.blank?
@@ -113,7 +113,7 @@ def hash_file
113113
end
114114
end
115115
hashlist.close
116-
print_status "Hashes Written out to #{hashlist.path}"
116+
print_status "Hashes written out to #{hashlist.path}"
117117
hashlist.path
118118
end
119119

modules/exploits/multi/http/gitlab_shell_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
ssh keys in the gitlab-shell functionality of Gitlab. Versions
2121
of gitlab-shell prior to 1.7.4 used the ssh key provided directly
2222
in a system call resulting in a command injection vulnerability. As
23-
this relies on adding an ssh key to an account valid credentials
23+
this relies on adding an ssh key to an account, valid credentials
2424
are required to exploit this vulnerability.
2525
),
2626
'Author' =>

modules/exploits/unix/http/vmturbo_vmtadmin_exec_noauth.rb

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution',
17+
'Name' => 'VMTurbo Operations Manager vmtadmin.cgi Remote Command Execution',
1818
'Description' => %q{
1919
VMTurbo Operations Manager 4.6 and prior are vulnerable to unauthenticated
2020
OS Command injection in the web interface. Use reverse payloads for the most
@@ -93,6 +93,16 @@ def check
9393
return Exploit::CheckCode::Unknown
9494
end
9595

96+
# NOTE (@todb): This PHP style comparison seems incorrect, since
97+
# strings are being compared and not numbers. Example:
98+
# 1.9.3p547 :001 > a = "4.6"
99+
# => "4.6"
100+
# 1.9.3p547 :002 > b = "10.6"
101+
# => "10.6"
102+
# 1.9.3p547 :003 > a <= b
103+
#
104+
# Also, the description says 4.5 is also vuln. This doesn't
105+
# appear to care.
96106
if version and version <= "4.6" and build < "28657"
97107
return Exploit::CheckCode::Appears
98108
else

modules/exploits/windows/local/mqac_write.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ def exploit
160160
session.railgun.ntdll.NtQueryIntervalProfile(1337, 4)
161161

162162
unless is_system?
163-
print_error('Exploit failed')
163+
print_error('Did not get system, exploit failed')
164164
return
165165
end
166166

modules/exploits/windows/local/virtual_box_opengl_escape.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ def initialize(info={})
4040
'Description' => %q{
4141
This module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The
4242
vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a
43-
sequence of specially crafted of rendering messages, a virtual machine can exploit an out
43+
sequence of specially crafted rendering messages, a virtual machine can exploit an out
4444
of bounds array access to corrupt memory and escape to the host. This module has been
4545
tested successfully on Windows 7 SP1 (64 bits) as Host running Virtual Box 4.3.6.
4646
},

modules/post/linux/gather/gnome_commander_creds.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ def run
5050
vprint_line(str_file)
5151
#Store file
5252
p = store_loot("connections", "text/plain", session, str_file, connections_file, "Gnome-Commander connections")
53-
print_good ("Connections file saved to #{p}")
53+
print_good("Connections file saved to #{p}")
5454
rescue EOFError
5555
# If there's nothing in the file, we hit EOFError
5656
print_error("Nothing read from file: #{connections_file}, file may be empty")

0 commit comments

Comments
 (0)