Land #4123, release fixes

bug/bundler_fix
William Vu 2014-11-03 16:20:00 -06:00
commit 277fd5c7a1
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
5 changed files with 14 additions and 11 deletions

View File

@ -12,10 +12,10 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info={})
super(update_info(info,
'Name' => 'Xerox Administrator Console Password Extract',
'Description' => %{
This module will extract the management consoles admin password from the Xerox file system
using firmware bootstrap injection.
'Name' => 'Xerox Administrator Console Password Extractor',
'Description' => %q{
This module will extract the management console's admin password from the
Xerox file system using firmware bootstrap injection.
},
'Author' =>
[

View File

@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info={})
super(update_info(info,
'Name' => 'Xerox Workcentre 5735 LDAP Service Redential Extractor',
'Description' => %{
This module extract the printers LDAP user and password from Xerox workcentre 5735.
'Description' => %q{
This module extract the printer's LDAP username and password from Xerox Workcentre 5735.
},
'Author' =>
[

View File

@ -16,7 +16,10 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Buffalo NAS Login Utility',
'Description' => 'This module simply attempts to login to a Buffalo NAS instance using a specific user/pass. It is confirmed to work with 1.68',
'Description' => %q{
This module simply attempts to login to a Buffalo NAS instance using a specific
username and password. It has been confirmed to work on version 1.68
},
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
'License' => MSF_LICENSE
)

View File

@ -13,9 +13,9 @@ class Metasploit4 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'CUPS Filter Bash Environment Variable Code Injection',
'Description' => %q{
This module exploits a post-auth code injection in specially crafted
environment variables in Bash, specifically targeting CUPS filters
through the PRINTER_INFO and PRINTER_LOCATION variables by default.
This module exploits Shellshock, a post-authentication code injection vulnerability
in specially crafted environment variables in Bash. It specifically targets
CUPS filters through the PRINTER_INFO and PRINTER_LOCATION variables by default.
},
'Author' => [
'Stephane Chazelas', # Vulnerability discovery

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Xerox Multifunction Printers (MFP) "Patch" DLM Vulnerability',
'Description' => %{
'Description' => %q{
This module exploits a vulnerability found in Xerox Multifunction Printers (MFP). By
supplying a modified Dynamic Loadable Module (DLM), it is possible to execute arbitrary
commands under root priviages.