File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed
modules/exploits/windows/mysql Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -13,12 +13,12 @@ class Metasploit3 < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Oracle MySQL for Microsoft Windows File Write ' ,
16
+ 'Name' => 'Oracle MySQL for Microsoft Windows FILE Privilege Abuse ' ,
17
17
'Description' => %q{
18
- This module takes advantage of a file privilege misconfiguration problem
19
- specifically against Windows MySQL servers. This module writes a payload to
20
- Microsoft's All Users Start Up directory which will execute every time a
21
- user logs in.
18
+ This module takes advantage of a file privilege misconfiguration problem
19
+ specifically against Windows MySQL servers. This module abuses the FILE
20
+ privilege to write a payload to Microsoft's All Users Start Up directory
21
+ which will execute every time a user logs in.
22
22
} ,
23
23
'Author' =>
24
24
[
@@ -27,7 +27,7 @@ def initialize(info = {})
27
27
] ,
28
28
'DefaultOptions' =>
29
29
{
30
- 'DisablePayloadHandler' => 'true'
30
+ 'DisablePayloadHandler' => 'true'
31
31
} ,
32
32
'License' => MSF_LICENSE ,
33
33
'References' =>
You can’t perform that action at this time.
0 commit comments