Update description

bug/bundler_fix
William Vu 2016-11-04 13:48:29 -05:00
parent bf7936adf5
commit 009d6a45aa
1 changed files with 4 additions and 1 deletions

View File

@ -13,7 +13,10 @@ class MetasploitModule < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
'Description' => %q{
This module exploits remote code execution vulnerabilities in dRuby
This module exploits remote code execution vulnerabilities in dRuby.
If the dRuby application sets $SAFE = 1, the instance_eval target will fail.
In this event, the syscall target is preferred. This can be set with target 1.
},
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
'License' => MSF_LICENSE,