File tree Expand file tree Collapse file tree 1 file changed +2
-1
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +2
-1
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => 'PhpMyAdmin Authenticated Remote Code Execution via preg_replace()' ,
17
+ 'Name' => 'phpMyAdmin Authenticated Remote Code Execution via preg_replace()' ,
18
18
'Description' => %q{
19
19
This module exploits a PREG_REPLACE EVAL vulnerability in PhpMyAdmin's
20
20
replace_prefix_tbl in libraries/mult_submits.inc.php via db_settings.php
@@ -31,6 +31,7 @@ def initialize(info = {})
31
31
[ 'PMASA' , '2013-2' ] ,
32
32
[ 'waraxe' , '2013-SA#103' ] ,
33
33
[ 'URL' , 'http://www.waraxe.us/advisory-103.html' ] ,
34
+ [ 'URL' , 'http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php' ]
34
35
] ,
35
36
'Privileged' => false ,
36
37
'Platform' => [ 'php' ] ,
You can’t perform that action at this time.
0 commit comments