Skip to content

Commit f55edac

Browse files
committed
Title and description update
1 parent a510084 commit f55edac

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/linux/smtp/exim4_dovecot_exec.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ class Metasploit3 < Msf::Exploit::Remote
1818

1919
def initialize(info = {})
2020
super(update_info(info,
21-
'Name' => 'Exim And Dovecot Insecure Configuration Command Injection',
21+
'Name' => 'Exim and Dovecot Insecure Configuration Command Injection',
2222
'Description' => %q{
23-
This module exploits a command injection vulnerability against Exim with the
24-
Dovecot component with the "use_shell" option. It uses the sender's address to
25-
inject arbitary commands since this is one of the user-controlled variables, which
26-
has been successfully tested on Debian Squeeze using the default Exim4 with
27-
dovecot-common packages.
23+
This module exploits a command injection vulnerability against Dovecot with
24+
Exim using the "use_shell" option. It uses the sender's address to inject arbitary
25+
commands since this is one of the user-controlled variables, which has been
26+
successfully tested on Debian Squeeze using the default Exim4 with dovecot-common
27+
packages.
2828
},
2929
'Author' =>
3030
[

0 commit comments

Comments
 (0)