Update description
parent
bf7936adf5
commit
009d6a45aa
|
@ -13,7 +13,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
|
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits remote code execution vulnerabilities in dRuby
|
This module exploits remote code execution vulnerabilities in dRuby.
|
||||||
|
|
||||||
|
If the dRuby application sets $SAFE = 1, the instance_eval target will fail.
|
||||||
|
In this event, the syscall target is preferred. This can be set with target 1.
|
||||||
},
|
},
|
||||||
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
|
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
Loading…
Reference in New Issue