Skip to content

Commit e98a463

Browse files
author
bwall
committed
Added license information and tidied up code
1 parent b23d259 commit e98a463

File tree

1 file changed

+10
-3
lines changed

1 file changed

+10
-3
lines changed

modules/exploits/multi/misc/stunshell_eval.rb

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# web site for more information on licensing and terms of use.
5+
# http://metasploit.com/
6+
##
7+
18
require 'msf/core'
29

310
class Metasploit3 < Msf::Exploit::Remote
@@ -8,8 +15,8 @@ def initialize(info={})
815
super(update_info(info,
916
'Name' => '"STUNSHELL" Web Shell Remote Code Execution(PHP eval)',
1017
'Description' => %q{
11-
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
12-
module works when safe mode is enabled on the web server. This shell is widely
18+
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
19+
module works when safe mode is enabled on the web server. This shell is widely
1320
used in automated RFI payloads.
1421
},
1522
'License' => MSF_LICENSE,
@@ -32,7 +39,7 @@ module works when safe mode is enabled on the web server. This shell is widely
3239
'Platform' => ['php'],
3340
'Arch' => ARCH_PHP,
3441
'Targets' => [['Automatic',{}]],
35-
'DisclosureDate' => 'March 23 2013',
42+
'DisclosureDate' => 'Mar 23 2013',
3643
'DefaultTarget' => 0))
3744

3845
register_options(

0 commit comments

Comments
 (0)