Skip to content

Commit 95b5ff6

Browse files
author
Tod Beardsley
committed
Minor fixups on recent modules.
Edited modules/auxiliary/admin/http/netgear_soap_password_extractor.rb first landed in rapid7#5301, @m-1-k-3's aux module to extract passwords from Netgear soap interfaces Edited modules/auxiliary/scanner/http/influxdb_enum.rb first landed in Edited modules/auxiliary/scanner/http/title.rb first landed in rapid7#5333, HTML Title Grabber Edited modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb first landed in rapid7#5401, multi-platform CVE-2015-0311 - Flash uncompress() UAF Edited modules/exploits/unix/webapp/wp_revslider_upload_execute.rb first landed in rapid7#5290, Wordpress RevSlider Module
1 parent b7f9d28 commit 95b5ff6

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

modules/auxiliary/admin/http/netgear_soap_password_extractor.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize
1616
'Description' => %q{
1717
This module exploits an authentication bypass vulnerability in different Netgear devices.
1818
It allows to extract the password for the remote management interface. This module has been
19-
tested on a Netgear WNDR3700v4 - V1.0.1.42, but others devices are reported as vulnerable:
19+
tested on a Netgear WNDR3700v4 - V1.0.1.42, but other devices are reported as vulnerable:
2020
NetGear WNDR3700v4 - V1.0.0.4SH, NetGear WNDR3700v4 - V1.0.1.52, NetGear WNR2200 - V1.0.1.88,
2121
NetGear WNR2500 - V1.0.0.24, NetGear WNDR3700v2 - V1.0.1.14 (Tested by Paula Thomas),
2222
NetGear WNDR3700v1 - V1.0.16.98 (Tested by Michal Bartoszkiewicz),

modules/auxiliary/scanner/http/influxdb_enum.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'InfluxDB Enum Utility',
1616
'Description' => %q{
17-
This module enumerates databases on InfluxDB using the REST API
18-
(using default authentication - root:root).
17+
This module enumerates databases on InfluxDB using the REST API using the
18+
default authentication of root:root.
1919
},
2020
'References' =>
2121
[

modules/auxiliary/scanner/http/title.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ def initialize
1515
super(
1616
'Name' => 'HTTP HTML Title Tag Content Grabber',
1717
'Description' => %q{
18-
Generates a GET request to the webservers provided and returns the server header,
19-
HTML title attribute and location header (if set). Useful for rapidly identifying
18+
Generates a GET request to the provided webservers and returns the server header,
19+
HTML title attribute and location header (if set). This is useful for rapidly identifying
2020
interesting web applications en mass.
2121
},
2222
'Author' => 'Stuart Morgan <stuart.morgan[at]mwrinfosecurity.com>',

modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => 'Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free',
1717
'Description' => %q{
18-
This module exploits an use after free vulnerability in Adobe Flash Player. The
18+
This module exploits a use after free vulnerability in Adobe Flash Player. The
1919
vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, when trying
2020
to uncompress() a malformed byte stream. This module has been tested successfully
2121
on:

modules/exploits/unix/webapp/wp_revslider_upload_execute.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability',
1818
'Description' => %q{
19-
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
20-
Slider Revolution (RevSlider) plugin, versions 3.0.95 and prior. The
21-
vulnerability allows for arbitrary file upload and remote code execution.
19+
This module exploits an arbitrary PHP code upload vulnerability in the
20+
WordPress ThemePunch Slider Revolution (RevSlider) plugin, versions 3.0.95
21+
and prior. The vulnerability allows for arbitrary file upload and remote code execution.
2222
},
2323
'Author' =>
2424
[

0 commit comments

Comments
 (0)