Skip to content

Commit 6be8822

Browse files
author
bwall
committed
Added the license information and tidied up
1 parent ca6ab7c commit 6be8822

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

modules/exploits/multi/misc/Ra1NX_pubcall_exec.rb

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# web site for more information on licensing and terms of use.
5+
# http://metasploit.com/
6+
##
7+
18
require 'msf/core'
29

310
class Metasploit3 < Msf::Exploit::Remote
@@ -6,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
613

714
def initialize(info = {})
815
super(update_info(info,
9-
'Name' => '"Ra1NX" PHP Bot pubcall Authentication Bypass Remote Code Execution',
16+
'Name' => '"Ra1NX" PHP Bot PubCall Authentication Bypass Remote Code Execution',
1017
'Description' => %q{
1118
This module allows remote command execution on the PHP IRC bot Ra1NX by
1219
using the public call feature in private message to covertly bypass the
@@ -40,7 +47,7 @@ def initialize(info = {})
4047
[ 'Ra1NX', { } ]
4148
],
4249
'Privileged' => false,
43-
'DisclosureDate' => 'March 24 2013',
50+
'DisclosureDate' => 'Mar 24 2013',
4451
'DefaultTarget' => 0))
4552

4653
register_options(

0 commit comments

Comments
 (0)