File tree Expand file tree Collapse file tree 1 file changed +4
-6
lines changed
modules/auxiliary/admin/http Expand file tree Collapse file tree 1 file changed +4
-6
lines changed Original file line number Diff line number Diff line change @@ -13,13 +13,11 @@ def initialize(info = {})
13
13
super ( update_info ( info ,
14
14
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack' ,
15
15
'Description' => %q{
16
- This module exploits a remote command injection vulnerability in bash,
17
- a popular shell environment, over an HTTP CGI vector. By passing a specially-crafted
18
- string that is set as an environment variable, attckers may execute arbitrary operating
19
- system commands.
16
+ This module exploits a code injection in specially crafted environment
17
+ variables in Bash, specifically targeting Apache mod_cgi scripts through
18
+ the HTTP_USER_AGENT variable.
20
19
21
- For this version of the exploit, the target must already have netcat (nc) compiled with the
22
- -e option.
20
+ Netcat with the -e (GAPING_SECURITY_HOLE) option is required.
23
21
} ,
24
22
'Author' => [ 'wvu' ] ,
25
23
'References' => [
You can’t perform that action at this time.
0 commit comments