Skip to content

Commit cd842df

Browse files
committed
Correct phpMyAdmin
1 parent 6bb2af7 commit cd842df

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/multi/http/phpmyadmin_preg_replace.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'phpMyAdmin Authenticated Remote Code Execution via preg_replace()',
1818
'Description' => %q{
19-
This module exploits a PREG_REPLACE EVAL vulnerability in PhpMyAdmin's
19+
This module exploits a PREG_REPLACE EVAL vulnerability in phpMyAdmin's
2020
replace_prefix_tbl in libraries/mult_submits.inc.php via db_settings.php
2121
},
2222
'Author' =>
@@ -93,7 +93,7 @@ def check
9393
end
9494

9595
def exploit
96-
print_status("Grabbing CSRF token")
96+
print_status("Grabbing CSRF token...")
9797
response = send_request_cgi({ 'uri' => uri})
9898
if response.nil?
9999
fail_with(Exploit::Failure::NotFound, "Failed to retrieve webpage.")

0 commit comments

Comments
 (0)