Skip to content

Commit 6bb2af7

Browse files
committed
Add pma url
1 parent a918352 commit 6bb2af7

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/multi/http/phpmyadmin_preg_replace.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'PhpMyAdmin Authenticated Remote Code Execution via preg_replace()',
17+
'Name' => 'phpMyAdmin Authenticated Remote Code Execution via preg_replace()',
1818
'Description' => %q{
1919
This module exploits a PREG_REPLACE EVAL vulnerability in PhpMyAdmin's
2020
replace_prefix_tbl in libraries/mult_submits.inc.php via db_settings.php
@@ -31,6 +31,7 @@ def initialize(info = {})
3131
[ 'PMASA', '2013-2'],
3232
[ 'waraxe', '2013-SA#103' ],
3333
[ 'URL', 'http://www.waraxe.us/advisory-103.html' ],
34+
[ 'URL', 'http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php' ]
3435
],
3536
'Privileged' => false,
3637
'Platform' => ['php'],

0 commit comments

Comments
 (0)