Skip to content

Commit dae1679

Browse files
authored
Fixed build warnings
1 parent 02e065d commit dae1679

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

modules/exploits/windows/misc/vmhgfs_webdav_dll_sideload.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
# Based on WebDAV Application DLL Hijacker module
22
require 'msf/core'
33

4-
class Metasploit3 < Msf::Exploit::Remote
4+
class MetasploitModule < Msf::Exploit::Remote
55
Rank = NormalRanking
66

77
include Msf::Exploit::Remote::HttpServer::HTML
88
include Msf::Exploit::EXE
99

1010
def initialize(info = {})
1111
super(update_info(info,
12-
'Name' => 'DLL side loading vulnerability in VMware Host Guest Client Redirector',
12+
'Name' => 'DLL Side Loading Vulnerability in VMware Host Guest Client Redirector',
1313
'Description' => %q{
14-
A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector,
15-
a component of VMware Tools. This issue can be exploited by luring a victim into
16-
opening a document from the attacker's share. An attacker can exploit this issue to
17-
execute arbitrary code with the privileges of the target user. This can potentially
18-
result in the attacker taking complete control of the affected system. If the WebDAV
14+
A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector,
15+
a component of VMware Tools. This issue can be exploited by luring a victim into
16+
opening a document from the attacker's share. An attacker can exploit this issue to
17+
execute arbitrary code with the privileges of the target user. This can potentially
18+
result in the attacker taking complete control of the affected system. If the WebDAV
1919
Mini-Redirector is enabled, it is possible to exploit this issue over the internet.
2020
},
2121
'Author' => 'Yorick Koster',

0 commit comments

Comments
 (0)