File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ def initialize(info = {})
15
15
'Name' => 'Ericom AccessNow Server Buffer Overflow' ,
16
16
'Description' => %q{
17
17
This module exploits a stack based buffer overflow in Ericom AccessNow Server. The
18
- vulnerability is due to an insecure usage of vsprintf with used controlled data,
18
+ vulnerability is due to an insecure usage of vsprintf with user controlled data,
19
19
which can be triggered with a malformed HTTP request. This module has been tested
20
20
successfully with Ericom AccessNow Server 2.4.0.2 on Windows XP SP3 and Windows 2003
21
21
Server SP2.
@@ -93,7 +93,7 @@ def exploit
93
93
print_status ( "#{ peer } - Sending malformed request..." )
94
94
send_request_raw ( {
95
95
'method' => 'GET' ,
96
- 'uri' => exploit_uri ,
96
+ 'uri' => exploit_uri ,
97
97
'encode' => false
98
98
} , 1 )
99
99
end
You can’t perform that action at this time.
0 commit comments