From 16b7c778510cba2786e747373f1b7862e703394c Mon Sep 17 00:00:00 2001 From: mr_me Date: Thu, 27 Oct 2016 13:37:04 -0500 Subject: [PATCH] satisfying travis --- modules/exploits/multi/http/bassmaster_js_injection.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/bassmaster_js_injection.rb b/modules/exploits/multi/http/bassmaster_js_injection.rb index f46ae7b64e..adefe65300 100644 --- a/modules/exploits/multi/http/bassmaster_js_injection.rb +++ b/modules/exploits/multi/http/bassmaster_js_injection.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Bassmaster batch Arbitrary JavaScript Injection Remote Code Execution', + 'Name' => 'Bassmaster Batch Arbitrary JavaScript Injection Remote Code Execution', 'Description' => %q{ This module exploits an un-authenticated code injection vulnerability in the bassmaster nodejs plugin for hapi. The vulnerability is within the batch endpoint and allows an @@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Author' => [ 'mr_me ', # msf - 'Jarda Kotěšovec' # original bug finder + 'Jarda Kotesovec' # original bug finder ], 'References' => [