Skip to content

Commit 9af9d2f

Browse files
committed
slight cleanup
1 parent 1133332 commit 9af9d2f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/windows/http/ericom_access_now_bof.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
'Name' => 'Ericom AccessNow Server Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack based buffer overflow in Ericom AccessNow Server. The
18-
vulnerability is due to an insecure usage of vsprintf with used controlled data,
18+
vulnerability is due to an insecure usage of vsprintf with user controlled data,
1919
which can be triggered with a malformed HTTP request. This module has been tested
2020
successfully with Ericom AccessNow Server 2.4.0.2 on Windows XP SP3 and Windows 2003
2121
Server SP2.
@@ -93,7 +93,7 @@ def exploit
9393
print_status("#{peer} - Sending malformed request...")
9494
send_request_raw({
9595
'method' => 'GET',
96-
'uri' => exploit_uri,
96+
'uri' => exploit_uri,
9797
'encode' => false
9898
}, 1)
9999
end

0 commit comments

Comments
 (0)