Skip to content

Commit be5a0ee

Browse files
committed
Land rapid7#4777, @todb-r7's release fixes
2 parents fb06cb1 + 053de8e commit be5a0ee

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

modules/exploits/unix/webapp/maarch_letterbox_file_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1515
def initialize(info = {})
1616
super(update_info(
1717
info,
18-
'Name' => 'Maarch LetterBox 2.8 Unrestricted File Upload',
18+
'Name' => 'Maarch LetterBox Unrestricted File Upload',
1919
'Description' => %q{
2020
This module exploits a file upload vulnerability on Maarch LetterBox 2.8 due to a lack of
2121
session and file validation in the file_to_index.php script. It allows unauthenticated

modules/exploits/unix/webapp/wp_photo_gallery_unrestricted_file_upload.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,14 @@ class Metasploit3 < Msf::Exploit::Remote
1616
def initialize(info = {})
1717
super(update_info(
1818
info,
19-
'Name' => 'WordPress Photo Gallery 1.2.5 Unrestricted File Upload',
19+
'Name' => 'WordPress Photo Gallery Unrestricted File Upload',
2020
'Description' => %q{Photo Gallery Plugin for WordPress contains a flaw that allows a
2121
remote attacker to execute arbitrary PHP code. This flaw exists
2222
because the photo-gallery\photo-gallery.php script allows access
2323
to filemanager\UploadHandler.php. The post() method in UploadHandler.php
24-
does not properly verify or sanitize user-uploaded files.},
24+
does not properly verify or sanitize user-uploaded files.
25+
26+
This module was tested on version 1.2.5.},
2527
'License' => MSF_LICENSE,
2628
'Author' =>
2729
[

modules/post/windows/gather/phish_windows_credentials.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ def initialize(info={})
2020
'License' => MSF_LICENSE,
2121
'Author' =>
2222
[
23-
'Wesley Neelen <security[at]forsec.nl/@wez3forsec>', # Metasploit module
24-
'Matt Nelson (@enigma0x3)' # Author original powershell script
23+
'Wesley Neelen <security[at]forsec.nl', # Metasploit module, @wez3forsec on Twitter
24+
'Matt Nelson' # Original powershell script, @enigma0x3 on Twitter
2525
],
2626
'References' => [ 'URL', 'https://forsec.nl/2015/02/windows-credentials-phishing-using-metasploit' ],
2727
'Platform' => [ 'win' ],

0 commit comments

Comments
 (0)