diff --git a/modules/exploits/linux/misc/mongod_native_helper.rb b/modules/exploits/linux/misc/mongod_native_helper.rb index 1e4e375e4d..232dda875c 100644 --- a/modules/exploits/linux/misc/mongod_native_helper.rb +++ b/modules/exploits/linux/misc/mongod_native_helper.rb @@ -14,9 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => 'MongoDB nativeHelper.apply Instruction Pointer Control', + 'Name' => 'MongoDB nativeHelper.apply Remote Code Execution', 'Description' => %q{ - This module exploit a feature in spiderMonkey to control Instruction Pointer. + This module exploit a the nativeHelper feature from spiderMonkey which allows to + to control execution by calling it wit specially crafted arguments. This module + has been tested successfully on MongoDB 2.2.3 on Ubuntu 10.04 and Debian Squeeze. }, 'Author' => [