Skip to content

Commit dd86903

Browse files
committed
Land rapid7#3722, fix typos in openssl ccs scanner
2 parents 6d45f75 + 784ece5 commit dd86903

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/auxiliary/scanner/ssl/openssl_ccs.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,9 @@ def initialize
7979
super(
8080
'Name' => 'OpenSSL Server-Side ChangeCipherSpec Injection Scanner',
8181
'Description' => %q{
82-
This module checks for the OpenSSL ChageCipherSpec (CCS)
82+
This module checks for the OpenSSL ChangeCipherSpec (CCS)
8383
Injection vulnerability. The problem exists in the handling of early
84-
CCS messages during session negotation. Vulnerable installations of OpenSSL accepts
84+
CCS messages during session negotiation. Vulnerable installations of OpenSSL accepts
8585
them, while later implementations do not. If successful, an attacker can leverage this
8686
vulnerability to perform a man-in-the-middle (MITM) attack by downgrading the cipher spec
8787
between a client and server. This issue was first reported in early June, 2014.
@@ -131,7 +131,7 @@ def ccs_injection
131131
sock.put(ccs)
132132
alert = sock.get_once(-1, response_timeout)
133133
if alert.blank?
134-
print_good("#{peer} - No alert after invalid CSS message, probably vulnerable")
134+
print_good("#{peer} - No alert after invalid CCS message, probably vulnerable")
135135
report
136136
elsif alert.unpack("C").first == ALERT_RECORD_TYPE
137137
vprint_error("#{peer} - Alert record as response to the invalid CCS Message, probably not vulnerable")

0 commit comments

Comments
 (0)