File tree Expand file tree Collapse file tree 1 file changed +2
-3
lines changed
modules/exploits/unix/webapp Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ def initialize(info={})
16
16
super ( update_info ( info ,
17
17
'Name' => "Narcissus Image Configuration Passthru Vulnerability" ,
18
18
'Description' => %q{
19
- This module exploits a vulnerability found in Narcissus' image configuration
19
+ This module exploits a vulnerability found in Narcissus image configuration
20
20
function. This is due to the backend.php file not handling the $release parameter
21
21
properly, and then passes it on to the configure_image() function. In this
22
22
function, the $release parameter can be used to inject system commands for
@@ -45,7 +45,7 @@ def initialize(info={})
45
45
{
46
46
'PayloadType' => 'cmd' ,
47
47
'RequiredCmd' => 'generic perl ruby python bash netcat-e'
48
- } ,
48
+ } ,
49
49
'Targets' =>
50
50
[
51
51
[ 'Narcissus' , { } ]
@@ -104,7 +104,6 @@ def check
104
104
def exploit
105
105
print_status ( "#{ peer } - Sending malicious request..." )
106
106
remote_exe ( payload . encoded )
107
- handler
108
107
end
109
108
110
109
You can’t perform that action at this time.
0 commit comments