Update description

bug/bundler_fix
William Vu 2016-11-04 13:48:29 -05:00
parent bf7936adf5
commit 009d6a45aa
1 changed files with 4 additions and 1 deletions

View File

@ -13,7 +13,10 @@ class MetasploitModule < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution', 'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
'Description' => %q{ 'Description' => %q{
This module exploits remote code execution vulnerabilities in dRuby This module exploits remote code execution vulnerabilities in dRuby.
If the dRuby application sets $SAFE = 1, the instance_eval target will fail.
In this event, the syscall target is preferred. This can be set with target 1.
}, },
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit) 'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,