From 29ad9939e152252337128efeb7cd7247f3b3583b Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Thu, 28 Mar 2013 15:11:20 +0100 Subject: [PATCH] cleanup for stunshell_eval --- modules/exploits/multi/http/stunshell_eval.rb | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/modules/exploits/multi/http/stunshell_eval.rb b/modules/exploits/multi/http/stunshell_eval.rb index e5d3961c16..61ec4052ef 100644 --- a/modules/exploits/multi/http/stunshell_eval.rb +++ b/modules/exploits/multi/http/stunshell_eval.rb @@ -14,16 +14,16 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => 'STUNSHELL Web Shell Remote Code Execution(PHP eval)', + 'Name' => 'STUNSHELL Web Shell Remote PHP Code Execution', 'Description' => %q{ - his module exploits unauthenticated versions of the "STUNSHELL" web shell. This - module works when safe mode is enabled on the web server. This shell is widely + This module exploits unauthenticated versions of the "STUNSHELL" web shell. + This module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads. }, 'License' => MSF_LICENSE, 'Author' => [ - 'bwall ', # vuln discovery & msf module + 'bwall ' # vuln discovery & msf module ], 'References' => [ @@ -35,14 +35,13 @@ class Metasploit3 < Msf::Exploit::Remote { 'Keys' => ['php'], 'Space' => 10000, - 'DisableNops' => true, + 'DisableNops' => true }, 'Platform' => ['php'], 'Arch' => ARCH_PHP, 'Targets' => [ - ['stunshell / Unix', { 'Platform' => 'unix' } ], - ['stunshell / Windows', { 'Platform' => 'win' } ] + ['stunshell', {}] ], 'DisclosureDate' => 'Mar 23 2013', 'DefaultTarget' => 0))