File tree Expand file tree Collapse file tree 1 file changed +10
-3
lines changed
modules/exploits/multi/misc Expand file tree Collapse file tree 1 file changed +10
-3
lines changed Original file line number Diff line number Diff line change
1
+ ##
2
+ # This file is part of the Metasploit Framework and may be subject to
3
+ # redistribution and commercial restrictions. Please see the Metasploit
4
+ # web site for more information on licensing and terms of use.
5
+ # http://metasploit.com/
6
+ ##
7
+
1
8
require 'msf/core'
2
9
3
10
class Metasploit3 < Msf ::Exploit ::Remote
@@ -8,8 +15,8 @@ def initialize(info={})
8
15
super ( update_info ( info ,
9
16
'Name' => '"STUNSHELL" Web Shell Remote Code Execution(PHP eval)' ,
10
17
'Description' => %q{
11
- This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
12
- module works when safe mode is enabled on the web server. This shell is widely
18
+ This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
19
+ module works when safe mode is enabled on the web server. This shell is widely
13
20
used in automated RFI payloads.
14
21
} ,
15
22
'License' => MSF_LICENSE ,
@@ -32,7 +39,7 @@ module works when safe mode is enabled on the web server. This shell is widely
32
39
'Platform' => [ 'php' ] ,
33
40
'Arch' => ARCH_PHP ,
34
41
'Targets' => [ [ 'Automatic' , { } ] ] ,
35
- 'DisclosureDate' => 'March 23 2013' ,
42
+ 'DisclosureDate' => 'Mar 23 2013' ,
36
43
'DefaultTarget' => 0 ) )
37
44
38
45
register_options (
You can’t perform that action at this time.
0 commit comments