Skip to content

Commit d52e9d4

Browse files
committed
Fix metadata again
1 parent 9dbf163 commit d52e9d4

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/windows/mysql/mysql_start_up.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,12 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Oracle MySQL for Microsoft Windows File Write',
16+
'Name' => 'Oracle MySQL for Microsoft Windows FILE Privilege Abuse',
1717
'Description' => %q{
18-
This module takes advantage of a file privilege misconfiguration problem
19-
specifically against Windows MySQL servers. This module writes a payload to
20-
Microsoft's All Users Start Up directory which will execute every time a
21-
user logs in.
18+
This module takes advantage of a file privilege misconfiguration problem
19+
specifically against Windows MySQL servers. This module abuses the FILE
20+
privilege to write a payload to Microsoft's All Users Start Up directory
21+
which will execute every time a user logs in.
2222
},
2323
'Author' =>
2424
[
@@ -27,7 +27,7 @@ def initialize(info = {})
2727
],
2828
'DefaultOptions' =>
2929
{
30-
'DisablePayloadHandler' => 'true'
30+
'DisablePayloadHandler' => 'true'
3131
},
3232
'License' => MSF_LICENSE,
3333
'References' =>

0 commit comments

Comments
 (0)