Skip to content

Commit 6289cc0

Browse files
committed
Merge branch 'spellin' of https://github.com/h00die/metasploit-framework into spellin
2 parents 0910c48 + 2ebf53b commit 6289cc0

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

modules/exploits/multi/http/vtiger_php_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Description' => %q{
1515
vTiger CRM allows an authenticated user to upload files to embed within documents.
1616
Due to insufficient privileges on the 'files' upload folder, an attacker can upload a PHP
17-
script and execute aribitrary PHP code remotely.
17+
script and execute arbitrary PHP code remotely.
1818
1919
This module was tested against vTiger CRM v5.4.0 and v5.3.0.
2020
},

modules/exploits/multi/misc/legend_bot_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
UDP flooding, the ability to remove system logs, and ability to gain root, and
1919
VNC scanning.
2020
21-
Kevin Stevens, a Senior Threat Researcher at Damballa has uploaded this script
21+
Kevin Stevens, a Senior Threat Researcher at Damballa, has uploaded this script
2222
to VirusTotal with a md5 of 11a9f1589472efa719827079c3d13f76.
2323
},
2424
'Author' =>

modules/exploits/unix/misc/xerox_mfp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Description' => %q{
1414
This module exploits a vulnerability found in Xerox Multifunction Printers (MFP). By
1515
supplying a modified Dynamic Loadable Module (DLM), it is possible to execute arbitrary
16-
commands under root privilages.
16+
commands under root privileges.
1717
},
1818
'Author' =>
1919
[

modules/exploits/unix/webapp/wp_google_document_embedder_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
blogging software plugin known as Google Document Embedder. The vulnerability allows for
2020
database credential disclosure via the /libs/pdf.php script. The Google Document Embedder
2121
plug-in versions 2.4.6 and below are vulnerable. This exploit only works when the MySQL
22-
server is exposed on an accessible IP and Wordpress has filesystem write access.
22+
server is exposed on an accessible IP and WordPress has filesystem write access.
2323
2424
Please note: The admin password may get changed if the exploit does not run to the end.
2525
},

modules/exploits/unix/webapp/wp_wptouch_file_upload.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@ class MetasploitModule < Msf::Exploit::Remote
1212
def initialize(info = {})
1313
super(update_info(
1414
info,
15-
'Name' => 'Wordpress WPTouch Authenticated File Upload',
15+
'Name' => 'WordPress WPTouch Authenticated File Upload',
1616
'Description' => %q{
17-
The Wordpress WPTouch plugin contains an authenticated file upload
17+
The WordPress WPTouch plugin contains an authenticated file upload
1818
vulnerability. A wp-nonce (CSRF token) is created on the backend index
1919
page and the same token is used on handling ajax file uploads through
2020
the plugin. By sending the captured nonce with the upload, we can
2121
upload arbitrary files to the upload folder. Because the plugin also
22-
uses its own file upload mechanism instead of the wordpress api it's
22+
uses its own file upload mechanism instead of the WordPress api it's
2323
possible to upload any file type.
2424
The user provided does not need special rights, and users with "Contributor"
2525
role can be abused.

0 commit comments

Comments
 (0)