File tree Expand file tree Collapse file tree 1 file changed +10
-3
lines changed
modules/exploits/multi/misc Expand file tree Collapse file tree 1 file changed +10
-3
lines changed Original file line number Diff line number Diff line change
1
+ ##
2
+ # This file is part of the Metasploit Framework and may be subject to
3
+ # redistribution and commercial restrictions. Please see the Metasploit
4
+ # web site for more information on licensing and terms of use.
5
+ # http://metasploit.com/
6
+ ##
7
+
1
8
require 'msf/core'
2
9
3
10
class Metasploit3 < Msf ::Exploit ::Remote
@@ -8,8 +15,8 @@ def initialize(info={})
8
15
super ( update_info ( info ,
9
16
'Name' => '"STUNSHELL" Web Shell Remote Code Execution' ,
10
17
'Description' => %q{
11
- This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
12
- module works when safe mode is disabled on the web server. This shell is widely
18
+ This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
19
+ module works when safe mode is disabled on the web server. This shell is widely
13
20
used in automated RFI payloads.
14
21
} ,
15
22
'License' => MSF_LICENSE ,
@@ -36,7 +43,7 @@ module works when safe mode is disabled on the web server. This shell is widely
36
43
'Platform' => [ 'unix' , 'win' ] ,
37
44
'Arch' => ARCH_CMD ,
38
45
'Targets' => [ [ 'Automatic' , { } ] ] ,
39
- 'DisclosureDate' => 'March 23 2013' ,
46
+ 'DisclosureDate' => 'Mar 23 2013' ,
40
47
'DefaultTarget' => 0 ) )
41
48
42
49
register_options (
You can’t perform that action at this time.
0 commit comments