From 0415d31c61ad81947cdee01ff77d54b3ab37fac4 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Wed, 28 Nov 2012 16:07:21 -0600 Subject: [PATCH] Update description --- modules/auxiliary/gather/eaton_nsm_creds.rb | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/modules/auxiliary/gather/eaton_nsm_creds.rb b/modules/auxiliary/gather/eaton_nsm_creds.rb index ab1ca505a9..d252a6ca7d 100644 --- a/modules/auxiliary/gather/eaton_nsm_creds.rb +++ b/modules/auxiliary/gather/eaton_nsm_creds.rb @@ -16,10 +16,9 @@ class Metasploit3 < Msf::Auxiliary super(update_info(info, 'Name' => 'Network Shutdown Module <= 3.21 (sort_values) Credential Dumper', 'Description' => %q{ - This module exploits a vulnerability in lib/dbtools.inc which uses - unsanitized user input inside a eval() call. Additionally the base64 encoded - user credentials are extracted from the database of the application. Please - note that in order to be able to steal credentials, the vulnerable service + This module will extract user credentials from Network Shutdown Module by exploiting + a vulnerability found in lib/dbtools.inc, which uses unsanitized user input inside a + eval() call. Please note that in order to extract credentials,the vulnerable service must have at least one USV module (an entry in the "nodes" table in mgedb.db) }, 'References' =>