Skip to content

Commit 7e56948

Browse files
committed
Update description about pureftpd_bash_env_exec
Make exploitable requirements more obvious
1 parent 313c240 commit 7e56948

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,12 @@ def initialize(info = {})
1616
'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection',
1717
'Description' => %q(
1818
This module exploits the code injection flaw known as shellshock which
19-
leverages specially crafted environment variables in Bash. This exploit
20-
specifically targets Pure-FTPd when configured to use an external
21-
program for authentication.
19+
leverages specially crafted environment variables in Bash.
20+
21+
Please note that this exploit specifically targets Pure-FTPd compiled with the --with-extauth
22+
flag, and an external bash program for authentication. If the server is not set up this way,
23+
understand that even if the operating system is vulnerable to 'Shellshock', it cannot be
24+
exploited via Pure-FTPd.
2225
),
2326
'Author' =>
2427
[
@@ -31,7 +34,8 @@ def initialize(info = {})
3134
['CVE', '2014-6271'],
3235
['OSVDB', '112004'],
3336
['EDB', '34765'],
34-
['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc']
37+
['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc'],
38+
['URL', 'http://download.pureftpd.org/pub/pure-ftpd/doc/README.Authentication-Modules']
3539
],
3640
'Payload' =>
3741
{

0 commit comments

Comments
 (0)