Skip to content

Commit e5b5439

Browse files
committed
Merge pull request rapid7#3500 from todb-r7/fixup-release
Release fixup: Description/whitespace changes (minor)
2 parents f1fcc23 + 9fef2ca commit e5b5439

File tree

4 files changed

+13
-11
lines changed

4 files changed

+13
-11
lines changed

modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,18 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Wordpress MailPoet (wysija-newsletters) Unauthenticated File Upload',
16+
'Name' => 'Wordpress MailPoet Newsletters (wysija-newsletters) Unauthenticated File Upload',
1717
'Description' => %q{
1818
The Wordpress plugin "MailPoet Newsletters" (wysija-newsletters) before 2.6.8
1919
is vulnerable to an unauthenticated file upload. The exploit uses the Upload Theme
20-
functionality to upload a zip file containing the payload. The plugin used the
20+
functionality to upload a zip file containing the payload. The plugin uses the
2121
admin_init hook, which is also executed for unauthenticated users when accessing
22-
a specific URL. The developers tried to fix the vulnerablility
23-
in version 2.6.7 but the fix can be bypassed. In PHPs default configuration,
22+
a specific URL. The first fix for this vulnerability appeared in version 2.6.7,
23+
but the fix can be bypassed. In PHP's default configuration,
2424
a POST variable overwrites a GET variable in the $_REQUEST array. The plugin
2525
uses $_REQUEST to check for access rights. By setting the POST parameter to
2626
something not beginning with 'wysija_', the check is bypassed. Wordpress uses
27-
the $_GET array to determine the page and is so not affected by this.
27+
the $_GET array to determine the page, so it is not affected by this.
2828
},
2929
'Author' =>
3030
[

modules/exploits/windows/http/oracle_event_processing_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
super(update_info(info,
1818
'Name' => 'Oracle Event Processing FileUploadServlet Arbitrary File Upload',
1919
'Description' => %q{
20-
This module exploits an Arbitrary File Upload vulnerability in Oracle Event Processing
20+
This module exploits an arbitrary file upload vulnerability in Oracle Event Processing
2121
11.1.1.7.0. The FileUploadServlet component, which requires no authentication, can be
2222
abused to upload a malicious file onto an arbitrary location due to a directory traversal
2323
flaw, and compromise the server. By default Oracle Event Processing uses a Jetty

modules/payloads/stagers/windows/reverse_hop_http.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,11 @@ def initialize(info = {})
1818
'Description' => "Tunnel communication over an HTTP hop point (note you must first upload "+
1919
"the hop.php found at #{File.expand_path("../../../../data/php/hop.php", __FILE__)} "+
2020
"to the HTTP server you wish to use as a hop)",
21-
'Author' => ['scriptjunkie <[email protected]>', 'hdm'],
21+
'Author' =>
22+
[
23+
'scriptjunkie <scriptjunkie[at]scriptjunkie.us>',
24+
'hdm'
25+
],
2226
'License' => MSF_LICENSE,
2327
'Platform' => 'win',
2428
'Arch' => ARCH_X86,
@@ -37,8 +41,7 @@ def initialize(info = {})
3741
deregister_options('LHOST', 'LPORT')
3842

3943
register_options([
40-
OptString.new('HOPURL',
41-
[ true, "The full URL of the hop script", "http://example.com/hop.php" ]
44+
OptString.new('HOPURL', [ true, "The full URL of the hop script", "http://example.com/hop.php" ]
4245
)
4346
], self.class)
4447
end

modules/post/windows/gather/credentials/skype.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,8 @@ def initialize(info={})
4949
hash.update password
5050
5151
puts hash.hexdigest
52-
53-
=end
5452
53+
=end
5554

5655
def decrypt_reg(data)
5756
rg = session.railgun

0 commit comments

Comments
 (0)