diff --git a/modules/exploits/windows/ftp/pcman_put.rb b/modules/exploits/windows/ftp/pcman_put.rb index 6ec62b9471..7062af3f5b 100644 --- a/modules/exploits/windows/ftp/pcman_put.rb +++ b/modules/exploits/windows/ftp/pcman_put.rb @@ -5,14 +5,14 @@ require 'msf/core' -class Metasploit3 < Msf::Exploit::Remote +class Metasploit4 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Ftp def initialize(info = {}) super(update_info(info, - 'Name' => 'PCMAN FTP Server v2.0.7 Buffer Overflow - PUT Command', + 'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command', 'Description' => %q{ This module exploits a buffer overflow vulnerability found in the PUT command of the PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous @@ -20,8 +20,8 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ - 'Jay Turla @shipcod3', # Initial Discovery - 'Chris Higgins @ch1gg1ns' # msf Module + 'Jay Turla', # Initial Discovery -- @shipcod3 + 'Chris Higgins' # msf Module -- @ch1gg1ns ], 'License' => MSF_LICENSE, 'References' => @@ -30,8 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'DefaultOptions' => { - 'EXITFUNC' => 'process', - 'VERBOSE' => true + 'EXITFUNC' => 'process' }, 'Payload' => { @@ -57,9 +56,9 @@ class Metasploit3 < Msf::Exploit::Remote disconnect if /220 PCMan's FTP Server 2\.0/ === banner - return Exploit::CheckCode::Appears + Exploit::CheckCode::Appears else - return Exploit::CheckCode::Safe + Exploit::CheckCode::Safe end end