Skip to content

Commit 7ae6383

Browse files
committed
Land rapid7#1935, @todb-r7's description cleanup
2 parents 3fbbe3e + f58e279 commit 7ae6383

File tree

7 files changed

+21
-18
lines changed

7 files changed

+21
-18
lines changed

modules/auxiliary/dos/upnp/miniupnpd_dos.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'MiniUPnPd 1.4 Denial of Service (DoS) Exploit',
1818
'Description' => %q{
19-
This module allows remote attackers to cause a denial of service in MiniUPnP 1.0
20-
server via specifically crafted UDP request.
19+
This module allows remote attackers to cause a denial of service (DoS)
20+
in MiniUPnP 1.0 server via a specifically crafted UDP request.
2121
},
2222
'Author' =>
2323
[

modules/exploits/linux/smtp/exim4_dovecot_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ def initialize(info = {})
2020
super(update_info(info,
2121
'Name' => 'Exim and Dovecot Insecure Configuration Command Injection',
2222
'Description' => %q{
23-
This module exploits a command injection vulnerability against Dovecot with
23+
This module exploits a command injection vulnerability against Dovecot with
2424
Exim using the "use_shell" option. It uses the sender's address to inject arbitary
25-
commands since this is one of the user-controlled variables, which has been
26-
successfully tested on Debian Squeeze using the default Exim4 with dovecot-common
25+
commands, since this is one of the user-controlled variables. It has been
26+
successfully tested on Debian Squeeze using the default Exim4 with the dovecot-common
2727
packages.
2828
},
2929
'Author' =>

modules/exploits/multi/browser/java_jre17_driver_manager.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ def initialize( info = {} )
2323
'Name' => 'Java Applet Driver Manager Privileged toString() Remote Code Execution',
2424
'Description' => %q{
2525
This module abuses the java.sql.DriverManager class where the toString() method
26-
is called over user supplied classes, from a doPrivileged block. The vulnerability
27-
affects Java version 7u17 and earlier. This exploit bypasses click-to-play on IE
28-
throw a specially crafted JNLP file. This bypass is applied mainly to IE, when Java
29-
Web Start can be launched automatically throw the ActiveX control. Otherwise the
26+
is called over user supplied classes from a doPrivileged block. The vulnerability
27+
affects Java version 7u17 and earlier. This exploit bypasses click-to-play on Internet Explorer
28+
and throws a specially crafted JNLP file. This bypass is applicable mainly to IE, where Java
29+
Web Start can be launched automatically through the ActiveX control. Otherwise, the
3030
applet is launched without click-to-play bypass.
3131
},
3232
'License' => MSF_LICENSE,

modules/exploits/windows/browser/synactis_connecttosynactis_bof.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ def initialize(info={})
3333
component, specifically PDF_IN_1.ocx. When a long string of data is given
3434
to the ConnectToSynactis function, which is meant to be used for the ldCmdLine
3535
argument of a WinExec call, a strcpy routine can end up overwriting a TRegistry
36-
class pointer saved on the stack, and results in arbitrary code execution under the
36+
class pointer saved on the stack, resulting in arbitrary code execution under the
3737
context of the user.
3838
3939
Also note that since the WinExec function is used to call the default browser,
40-
you must be aware that: 1) The default must be Internet Explorer, and 2) When the
40+
you must be aware that: 1) The default must be Internet Explorer, and 2) when the
4141
exploit runs, another browser will pop up.
4242
4343
Synactis PDF In-The-Box is also used by other software such as Logic Print 2013,
@@ -203,4 +203,4 @@ def on_request_uri(cli, request)
203203
print_status("Target selected as: #{target.name}")
204204
send_response(cli, get_html(cli, request, target), {'Content-Type'=>'text/html', 'Cache-Control'=>'no-cache'})
205205
end
206-
end
206+
end

modules/exploits/windows/http/novell_mdm_lfi.rb

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,16 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize
1616
super(
17-
'Name' => 'Novell Zenworks Mobile Device Managment Local File Inclusion Vulnerability',
17+
'Name' => 'Novell Zenworks Mobile Managment MDM.php Local File Inclusion Vulnerability',
1818
'Description' => %q{
19-
This module attempts to gain remote code execution on a server running
20-
Novell Zenworks Mobile Device Management.
19+
This module exercises a vulnerability in Novel Zenworks Mobile Management's Mobile Device Management component
20+
which can allow unauthenticated remote code execution. Due to a flaw in the MDM.php script's input validation,
21+
remote attackers can both upload and execute code via a directory traversal flaw exposed in the 'language'
22+
parameter of a POST call to DUSAP.php.
2123
},
2224
'Author' =>
2325
[
24-
'steponequit',
26+
'steponequit', # Metasploit module
2527
'Andrea Micalizzi (aka rgod)' #zdi report
2628
],
2729
'Platform' => 'win',
@@ -34,6 +36,7 @@ def initialize
3436
[
3537
['CVE', '2013-1081'],
3638
['OSVDB', '91119'],
39+
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-087/'],
3740
['URL', 'http://www.novell.com/support/kb/doc.php?id=7011895']
3841
],
3942
'DisclosureDate' => "Mar 13 2013",

modules/payloads/singles/cmd/unix/bind_awk.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ module Metasploit4
1818
def initialize(info = {})
1919
super(merge_info(info,
2020
'Name' => 'Unix Command Shell, Bind TCP (via AWK)',
21-
'Description' => 'Listen for a connection and spawn a command shell via AWK',
21+
'Description' => 'Listen for a connection and spawn a command shell via GNU AWK',
2222
'Author' =>
2323
[
2424
'espreto <robertoespreto[at]gmail.com>',

modules/payloads/singles/cmd/unix/reverse_awk.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ module Metasploit3
1818
def initialize(info = {})
1919
super(merge_info(info,
2020
'Name' => 'Unix Command Shell, Reverse TCP (via AWK)',
21-
'Description' => 'Creates an interactive shell via AWK',
21+
'Description' => 'Creates an interactive shell via GNU AWK',
2222
'Author' =>
2323
[
2424
'espreto <robertoespreto[at]gmail.com>',

0 commit comments

Comments
 (0)