Skip to content

Commit bae1940

Browse files
author
Tod Beardsley
committed
Various grammar, spelling, word choice fixes
1 parent 8ad80f1 commit bae1940

17 files changed

+46
-44
lines changed

modules/auxiliary/gather/huawei_wifi_info.rb

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -55,16 +55,16 @@ def initialize(info={})
5555
super(update_info(info,
5656
'Name' => "Huawei Datacard Information Disclosure Vulnerability",
5757
'Description' => %q{
58-
This module exploits an un-authenticated information disclosure vulnerability in Huawei
58+
This module exploits an unauthenticated information disclosure vulnerability in Huawei
5959
SOHO routers. The module will gather information by accessing the /api pages where
6060
authentication is not required, allowing configuration changes as well as information
61-
disclosure including any stored SMS.
61+
disclosure, including any stored SMS.
6262
},
6363
'License' => MSF_LICENSE,
6464
'Author' =>
6565
[
66-
'Jimson K James.',
67-
'<tomsmaily[at]aczire.com>', # Msf module
66+
'Jimson K James',
67+
'Tom James <tomsmaily[at]aczire.com>', # Msf module
6868
],
6969
'References' =>
7070
[
@@ -82,7 +82,7 @@ def initialize(info={})
8282

8383
end
8484

85-
#Gather basic router information
85+
# Gather basic router information
8686
def run
8787
get_router_info
8888
print_line('')
@@ -168,7 +168,7 @@ def get_router_ssid
168168
'uri' => '/api/wlan/basic-settings',
169169
})
170170

171-
#check whether we got any response from server and proceed.
171+
# check whether we got any response from server and proceed.
172172
unless is_target?(res)
173173
return nil
174174
end
@@ -273,19 +273,19 @@ def get_router_dhcp_info
273273
end
274274

275275
def is_target?(res)
276-
#check whether we got any response from server and proceed.
276+
# check whether we got any response from server and proceed.
277277
unless res
278278
print_error("#{peer} - Failed to get any response from server")
279279
return false
280280
end
281281

282-
#Is it a HTTP OK
282+
# Is it a HTTP OK
283283
unless res.code == 200
284284
print_error("#{peer} - Did not get HTTP 200, URL was not found")
285285
return false
286286
end
287287

288-
#Check to verify server reported is a Huawei router
288+
# Check to verify server reported is a Huawei router
289289
unless res.headers['Server'].match(/IPWEBS\/1.4.0/i)
290290
print_error("#{peer} - Target doesn't seem to be a Huawei router")
291291
return false

modules/auxiliary/gather/konica_minolta_pwd_extract.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,11 @@ class Metasploit3 < Msf::Auxiliary
1414
def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Konica Minolta Password Extractor',
17-
'Description' => %q(
18-
This module will extract FTP and SMB account usernames and passwords
19-
from Konica Minolta mfp devices. Tested models include: C224, C280,
20-
283, C353, C360, 363, 420, C452,C452, C452, C454e, C554 ),
17+
'Description' => %q{
18+
This module will extract FTP and SMB account usernames and passwords
19+
from Konica Minolta multifunction printer (MFP) devices. Tested models
20+
include: C224, C280, 283, C353, C360, 363, 420, C452,C452, C452, C454e, C554
21+
},
2122
'Author' =>
2223
[
2324
'Deral "Percentx" Heiland',

modules/auxiliary/gather/mcafee_epo_xxe.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ def initialize(info = {})
1818
off of the filesystem. This properties file contains an encrypted password that is set during
1919
installation. What is interesting about this password is that it is set as the same password
2020
as the database 'sa' user and of the admin user created during installation. This password
21-
is encrypted with a static key, and is encrypted using a weak cipher at that (ECB). By default,
22-
if installed with a local SQL Server instance, the SQL server is listening on all interfaces.
21+
is encrypted with a static key, and is encrypted using a weak cipher (ECB). By default,
22+
if installed with a local SQL Server instance, the SQL Server is listening on all interfaces.
2323
2424
Recovering this password allows an attacker to potentially authenticate as the 'sa' SQL Server
2525
user in order to achieve remote command execution with permissions of the database process. If
26-
the administrator has no changed the password for the initially created account since installation,
27-
the attacker also now has the password for this account. By default, 'admin' is recommended.
26+
the administrator has not changed the password for the initially created account since installation,
27+
the attacker will have the password for this account. By default, 'admin' is recommended.
2828
29-
Any user account can be used to exploit this, all that is needed is a pair of credentials.
29+
Any user account can be used to exploit this, all that is needed is a valid credential.
3030
3131
The most data that can be successfully retrieved is 255 characters due to length restrictions
3232
on the field used to perform the XXE attack.

modules/auxiliary/scanner/http/allegro_rompager_misfortune_cookie.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
'Misfortune Cookie' vulnerability which affects Allegro Software
2020
Rompager versions before 4.34 and can allow attackers to authenticate
2121
to the HTTP service as an administrator without providing valid
22-
credentials, however more specifics are not yet known.
22+
credentials.
2323
),
2424
'Author' => [
2525
'Jon Hart <jon_hart[at]rapid7.com>', # metasploit module

modules/auxiliary/voip/cisco_cucdm_call_forward.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info={})
1616
'Description' => %q{
1717
The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager
1818
(CDM) 10 does not properly implement access control, which allows remote attackers to
19-
modify user information. This module exploits the vulnerability for configure unauthorized
19+
modify user information. This module exploits the vulnerability to configure unauthorized
2020
call forwarding.
2121
},
2222
'Author' => 'fozavci',

modules/auxiliary/voip/cisco_cucdm_speed_dials.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info={})
1717
The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager
1818
(CDM), before version 10, doesn't implement access control properly, which allows remote
1919
attackers to modify user information. This module exploits the vulnerability to make
20-
unauthorized speeddial manipulations.
20+
unauthorized speeddial entity manipulations.
2121
},
2222
'Author' => 'fozavci',
2323
'References' =>

modules/exploits/linux/local/desktop_privilege_escalation.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ def initialize(info={})
2020
'Description' => %q{
2121
This module steals the user password of an administrative user on a desktop Linux system
2222
when it is entered for unlocking the screen or for doing administrative actions using
23-
policykit. Then it escalates to root privileges using sudo and the stolen user password.
23+
PolicyKit. Then, it escalates to root privileges using sudo and the stolen user password.
2424
It exploits the design weakness that there is no trusted channel for transferring the
2525
password from the keyboard to the actual password verificatition against the shadow file
2626
(which is running as root since /etc/shadow is only readable to the root user). Both
27-
screensavers (xscreensaver/gnome-screensaver) and policykit use a component running under
27+
screensavers (xscreensaver/gnome-screensaver) and PolicyKit use a component running under
2828
the current user account to query for the password and then pass it to a setuid-root binary
2929
to do the password verification. Therefore, it is possible to inject a password stealer
3030
after compromising the user account. Since sudo requires only the user password (and not

modules/exploits/multi/http/manageengine_auth_upload.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ def initialize(info = {})
1717
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk,
1818
AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts
1919
the upload does not handle correctly '../' sequences, which can be abused to write
20-
in the file system. Authentication is needed to exploit this vulnerability, but this module
20+
to the file system. Authentication is needed to exploit this vulnerability, but this module
2121
will attempt to login using the default credentials for the administrator and guest
22-
accounts. Alternatively you can provide a pre-authenticated cookie or a username / password
23-
combo. For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). All
22+
accounts. Alternatively, you can provide a pre-authenticated cookie or a username / password.
23+
For IT360 targets, enter the RPORT of the ServiceDesk instance (usually 8400). All
2424
versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer,
2525
SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this
2626
module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been

modules/exploits/multi/http/pandora_upload_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info={})
1515
super(update_info(info,
16-
'Name' => "Pandora v3.1 Auth Bypass and Arbitrary File Upload Vulnerability",
16+
'Name' => "Pandora FMS v3.1 Auth Bypass and Arbitrary File Upload Vulnerability",
1717
'Description' => %q{
18-
This module exploits an authentication bypass vulnerability in Pandora v3.1 as
18+
This module exploits an authentication bypass vulnerability in Pandora FMS v3.1 as
1919
disclosed by Juan Galiana Lara. It also integrates with the built-in pandora
2020
upload which allows a user to upload arbitrary files to the '/images/' directory.
2121

modules/exploits/unix/webapp/wp_symposium_shell_upload.rb

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,15 @@ def initialize(info = {})
1515
super(update_info(
1616
info,
1717
'Name' => 'WordPress WP Symposium 14.11 Shell Upload',
18-
'Description' => %q{WP Symposium Plugin for WordPress contains a
19-
flaw that allows a remote attacker to execute
20-
arbitrary PHP code. This flaw exists because the
21-
/wp-symposium/server/file_upload_form.php script
22-
does not properly verify or sanitize
23-
user-uploaded files. By uploading a .php file,
24-
the remote system will place the file in a
25-
user-accessible path. Making a direct request to
26-
the uploaded file will allow the attacker to
27-
execute the script with the privileges of the
28-
web server.},
18+
'Description' => %q{
19+
WP Symposium Plugin for WordPress contains a flaw that allows a remote attacker
20+
to execute arbitrary PHP code. This flaw exists because the
21+
/wp-symposium/server/file_upload_form.php script does not properly verify or
22+
sanitize user-uploaded files. By uploading a .php file, the remote system will
23+
place the file in a user-accessible path. Making a direct request to the
24+
uploaded file will allow the attacker to execute the script with the privileges
25+
of the web server.
26+
},
2927
'License' => MSF_LICENSE,
3028
'Author' =>
3129
[

0 commit comments

Comments
 (0)