Skip to content

Commit 959ea1f

Browse files
author
jvazquez-r7
committed
final cleanup
1 parent b002996 commit 959ea1f

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

modules/exploits/unix/webapp/narcissus_backend_exec.rb

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info={})
1616
super(update_info(info,
1717
'Name' => "Narcissus Image Configuration Passthru Vulnerability",
1818
'Description' => %q{
19-
This module exploits a vulnerability found in Narcissus' image configuration
19+
This module exploits a vulnerability found in Narcissus image configuration
2020
function. This is due to the backend.php file not handling the $release parameter
2121
properly, and then passes it on to the configure_image() function. In this
2222
function, the $release parameter can be used to inject system commands for
@@ -45,7 +45,7 @@ def initialize(info={})
4545
{
4646
'PayloadType' => 'cmd',
4747
'RequiredCmd' => 'generic perl ruby python bash netcat-e'
48-
},
48+
},
4949
'Targets' =>
5050
[
5151
['Narcissus', {}]
@@ -104,7 +104,6 @@ def check
104104
def exploit
105105
print_status("#{peer} - Sending malicious request...")
106106
remote_exe(payload.encoded)
107-
handler
108107
end
109108

110109

0 commit comments

Comments
 (0)