Skip to content

Commit 6ede476

Browse files
committed
Update joomla_ecommercewd_sqli_scanner.rb
1 parent 0dbd854 commit 6ede476

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit4 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Web-Dorado ECommerce WD for Joomla! search_category_id SQL injection Scanner',
17+
'Name' => 'Web-Dorado ECommerce WD for Joomla! search_category_id SQL Injection Scanner',
1818
'Description' => %q{
1919
This module will scan for hosts vulnerable to an unauthenticated SQL injection within the
2020
advanced search feature of the Web-Dorado ECommerce WD 1.2.5 and likely prior.
@@ -64,14 +64,14 @@ def run_host(ip)
6464
})
6565

6666
unless res && res.body
67-
vprint_error("#{peer} - Server didn't respond in an expected way")
67+
vprint_error("#{peer} - Server did not respond in an expected way")
6868
return
6969
end
7070

7171
result = res.body =~ /#{left_marker}#{flag}#{right_marker}/
7272

7373
if result
74-
print_good("#{peer} - Vulnerable to CVE-2015-2562 (search_category parameter SQL injection)")
74+
print_good("#{peer} - Vulnerable to CVE-2015-2562 (search_category_id parameter SQL injection)")
7575
report_vuln({
7676
:host => rhost,
7777
:port => rport,
@@ -80,5 +80,7 @@ def run_host(ip)
8080
:refs => self.references.select { |ref| ref.ctx_val == "2015-2562" }
8181
})
8282
end
83+
8384
end
85+
8486
end

0 commit comments

Comments
 (0)