Skip to content

Commit e8bc89a

Browse files
committed
Land rapid7#3337, release fixes
2 parents b81f94a + c97c827 commit e8bc89a

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

modules/auxiliary/gather/f5_bigip_cookie_disclosure.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'F5 BigIP Backend Cookie Disclosure',
1616
'Description' => %q{
17-
This module identify F5 BigIP Load Balancers and leaks backends
18-
information through cookies.
17+
This module identifies F5 BigIP load balancers and leaks backend
18+
information through cookies inserted by the BigIP devices.
1919
},
2020
'Author' => [ 'Thanat0s <thanspam[at]trollprod.org>' ],
2121
'References' =>
@@ -96,13 +96,13 @@ def run
9696
cookie = get_cookie() # Get the cookie
9797
# If the cookie is not found, stop process
9898
if cookie.empty? || cookie[:id].nil?
99-
print_error("#{peer} - F5 Server Load Balancing cookie not found")
99+
print_error("#{peer} - F5 Server load balancing cookie not found")
100100
break
101101
end
102102

103103
# Print the cookie name on the first request
104104
if i == 0
105-
print_status("#{peer} - F5 Server Load Balancing \"#{cookie[:id]}\" found")
105+
print_status("#{peer} - F5 Server load balancing cookie \"#{cookie[:id]}\" found")
106106
end
107107

108108
back_end = cookie_decode(cookie[:value])

modules/exploits/multi/http/struts_code_exec_classloader.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ def initialize(info = {})
1717
'Name' => 'Apache Struts ClassLoader Manipulation Remote Code Execution',
1818
'Description' => %q{
1919
This module exploits a remote command execution vulnerability in Apache Struts
20-
versions < 2.3.16.2. This issue is caused because the ParametersInterceptor allows
21-
access to 'class' parameter which is directly mapped to getClass() method and
22-
allows ClassLoader manipulation, which allows remote attackers to execute arbitrary
20+
versions < 2.3.16.2. This vulnerability is due to the ParametersInterceptor, which allows
21+
access to 'class' parameter that is directly mapped to getClass() method and
22+
allows ClassLoader manipulation. As a result, this can allow remote attackers to execute arbitrary
2323
Java code via crafted parameters.
2424
},
2525
'Author' =>

modules/exploits/windows/local/ms13_053_schlamperei.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
require 'rex'
99

1010
class Metasploit3 < Msf::Exploit::Local
11-
Rank = GreatRanking
11+
Rank = AverageRanking
1212

1313
include Msf::Post::File
1414
include Msf::Post::Windows::Priv
@@ -20,11 +20,11 @@ def initialize(info={})
2020
super(update_info(info, {
2121
'Name' => 'Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)',
2222
'Description' => %q{
23-
A kernel pool overflow in Win32k which allows local privilege escalation.
23+
This module leverages a kernel pool overflow in Win32k which allows local privilege escalation.
2424
The kernel shellcode nulls the ACL for the winlogon.exe process (a SYSTEM process).
2525
This allows any unprivileged process to freely migrate to winlogon.exe, achieving
26-
privilege escalation. Used in pwn2own 2013 by MWR to break out of chrome's sandbox.
27-
NOTE: when you exit the meterpreter session, winlogon.exe is likely to crash.
26+
privilege escalation. This exploit was used in pwn2own 2013 by MWR to break out of chrome's sandbox.
27+
NOTE: when a meterpreter session started by this exploit exits, winlogin.exe is likely to crash.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>

0 commit comments

Comments
 (0)