Skip to content

Commit e37fa3b

Browse files
author
bwall
committed
Added license information and tidied up code
1 parent 7e0b0ac commit e37fa3b

File tree

1 file changed

+10
-3
lines changed

1 file changed

+10
-3
lines changed

modules/exploits/multi/misc/stunshell_exec.rb

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# web site for more information on licensing and terms of use.
5+
# http://metasploit.com/
6+
##
7+
18
require 'msf/core'
29

310
class Metasploit3 < Msf::Exploit::Remote
@@ -8,8 +15,8 @@ def initialize(info={})
815
super(update_info(info,
916
'Name' => '"STUNSHELL" Web Shell Remote Code Execution',
1017
'Description' => %q{
11-
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
12-
module works when safe mode is disabled on the web server. This shell is widely
18+
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
19+
module works when safe mode is disabled on the web server. This shell is widely
1320
used in automated RFI payloads.
1421
},
1522
'License' => MSF_LICENSE,
@@ -36,7 +43,7 @@ module works when safe mode is disabled on the web server. This shell is widely
3643
'Platform' => ['unix', 'win'],
3744
'Arch' => ARCH_CMD,
3845
'Targets' => [['Automatic',{}]],
39-
'DisclosureDate' => 'March 23 2013',
46+
'DisclosureDate' => 'Mar 23 2013',
4047
'DefaultTarget' => 0))
4148

4249
register_options(

0 commit comments

Comments
 (0)