Skip to content

Commit 8235556

Browse files
committed
Land rapid7#3372, release fixes
2 parents 1ef16fb + 0ef2e07 commit 8235556

File tree

5 files changed

+8
-8
lines changed

5 files changed

+8
-8
lines changed

modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
This module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The
2020
vulnerability exists in the DBVisitor.dll component, and can be abused through malicious
2121
requests to the ChartThemeConfig web service. This module can be used to extract the site
22-
and projects usernames and hashes.
22+
and project usernames and hashes.
2323
},
2424
'References' =>
2525
[

modules/auxiliary/scanner/snmp/brocade_enumhash.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ def run_host(ip)
4444
row.each { |val| @hashes << val.value.to_s }
4545
end
4646

47-
print_good("#{ip} Found Users & Password Hashes:")
47+
print_good("#{ip} - Found user and password hashes:")
4848
end
4949

5050
credinfo = ""
@@ -67,7 +67,7 @@ def run_host(ip)
6767
rescue ::Interrupt
6868
raise $!
6969
rescue ::Exception => e
70-
print_error("#{ip} error: #{e.class} #{e}")
70+
print_error("#{ip} - Error: #{e.class} #{e}")
7171
disconnect_snmp
7272
end
7373
end

modules/auxiliary/scanner/snmp/netopia_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ def run_host(ip)
9595
rescue ::Interrupt
9696
raise $!
9797
rescue ::Exception => e
98-
print_error("#{ip} error: #{e.class} #{e}")
98+
print_error("#{ip} - Error: #{e.class} #{e}")
9999
disconnect_snmp
100100
end
101101
end

modules/auxiliary/scanner/snmp/ubee_ddw3611.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ def run_host(ip)
152152
rescue ::Interrupt
153153
raise $!
154154
rescue ::Exception => e
155-
print_error("#{ip} error: #{e.class} #{e}")
155+
print_error("#{ip} - Error: #{e.class} #{e}")
156156
disconnect_snmp
157157
end
158158
end

modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ def initialize(info = {})
1919
'Description' => %q{
2020
This module exploits a code execution flaw in Symantec Workspace Streaming. The
2121
vulnerability exists in the ManagementAgentServer.putFile XMLRPC call exposed by the
22-
as_agent.exe service, which allows to upload arbitrary files under the server root.
23-
This module abuses the auto deploy feature at the JBoss as_ste.exe's instance in order
22+
as_agent.exe service, which allows for uploading arbitrary files under the server root.
23+
This module abuses the auto deploy feature in the JBoss as_ste.exe instance in order
2424
to achieve remote code execution. This module has been tested successfully on Symantec
2525
Workspace Streaming 6.1 SP8 and Windows 2003 SP2. Abused services listen on a single
26-
machine deployment, and also at the backend role in a multiple machines deployment
26+
machine deployment, and also in the backend role in a multiple machine deployment.
2727
},
2828
'Author' =>
2929
[

0 commit comments

Comments
 (0)