Skip to content

Commit 8817c0e

Browse files
committed
Change description a bit
Try to make this sound smoother
1 parent 807e2df commit 8817c0e

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

modules/exploits/windows/scada/abb_wserver_exec.rb

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,12 @@ def initialize(info = {})
1616
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
1717
'Description' => %q{
1818
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
19-
vulnerability exists on the wserver.exe component, disabled by default but required when
20-
a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of
21-
EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This
22-
module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3
23-
and Windows 7 SP1.
19+
issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe
20+
component, which allows arbitrary commands. The component is disabled by default, but
21+
required when a project uses the SCIL function WORKSTATION_CALL.
22+
23+
This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over
24+
Windows XP SP3 and Windows 7 SP1.
2425
},
2526
'License' => MSF_LICENSE,
2627
'Author' =>

0 commit comments

Comments
 (0)