Skip to content

Commit a510084

Browse files
committed
Description change.
1 parent 6004948 commit a510084

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

modules/exploits/linux/smtp/exim4_dovecot_exec.rb

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,10 @@ def initialize(info = {})
2020
super(update_info(info,
2121
'Name' => 'Exim And Dovecot Insecure Configuration Command Injection',
2222
'Description' => %q{
23-
This module exploits a command injection vulnerability when using together
24-
Exim and Dovecot with the use_shell option on the Exim configuration. This module
25-
uses the sender address to inject the arbitrary commands, since is one of the
26-
user-controlled variables used by default on example vulnerable configurations. The
27-
module has been tested successfully on Debian Squeeze by using the default exim4 and
23+
This module exploits a command injection vulnerability against Exim with the
24+
Dovecot component with the "use_shell" option. It uses the sender's address to
25+
inject arbitary commands since this is one of the user-controlled variables, which
26+
has been successfully tested on Debian Squeeze using the default Exim4 with
2827
dovecot-common packages.
2928
},
3029
'Author' =>
@@ -216,6 +215,4 @@ def exploit
216215

217216
end
218217

219-
220-
221218
end

0 commit comments

Comments
 (0)