cleanup for stunshell_eval

unstable
jvazquez-r7 2013-03-28 15:11:20 +01:00
parent 514aed404c
commit 29ad9939e1
1 changed files with 6 additions and 7 deletions

View File

@ -14,16 +14,16 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => 'STUNSHELL Web Shell Remote Code Execution(PHP eval)',
'Name' => 'STUNSHELL Web Shell Remote PHP Code Execution',
'Description' => %q{
his module exploits unauthenticated versions of the "STUNSHELL" web shell. This
module works when safe mode is enabled on the web server. This shell is widely
This module exploits unauthenticated versions of the "STUNSHELL" web shell.
This module works when safe mode is enabled on the web server. This shell is widely
used in automated RFI payloads.
},
'License' => MSF_LICENSE,
'Author' =>
[
'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module
'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
],
'References' =>
[
@ -35,14 +35,13 @@ class Metasploit3 < Msf::Exploit::Remote
{
'Keys' => ['php'],
'Space' => 10000,
'DisableNops' => true,
'DisableNops' => true
},
'Platform' => ['php'],
'Arch' => ARCH_PHP,
'Targets' =>
[
['stunshell / Unix', { 'Platform' => 'unix' } ],
['stunshell / Windows', { 'Platform' => 'win' } ]
['stunshell', {}]
],
'DisclosureDate' => 'Mar 23 2013',
'DefaultTarget' => 0))