From e737b136cc437057fd4e0f4e27b36f3e98a76c09 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Mon, 9 Dec 2013 14:00:11 -0600 Subject: [PATCH] Minor grammar/caps fixup for release --- modules/auxiliary/dos/http/rails_action_view.rb | 6 +++--- modules/auxiliary/gather/vbulletin_vote_sqli.rb | 2 +- modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb | 2 +- modules/post/windows/gather/forensics/browser_history.rb | 2 +- test/modules/post/test/extapi.rb | 2 +- 5 files changed, 7 insertions(+), 7 deletions(-) diff --git a/modules/auxiliary/dos/http/rails_action_view.rb b/modules/auxiliary/dos/http/rails_action_view.rb index ecf9b0e61b..857e61fee4 100644 --- a/modules/auxiliary/dos/http/rails_action_view.rb +++ b/modules/auxiliary/dos/http/rails_action_view.rb @@ -11,12 +11,12 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'Ruby-on-Rails Action View MIME Memory Exhaustion', + 'Name' => 'Ruby on Rails Action View MIME Memory Exhaustion', 'Description' => %q{ This module exploits a Denial of Service (DoS) condition in Action View that requires - a controller action. By sending a specially crafted content-type header to a rails + a controller action. By sending a specially crafted content-type header to a Rails application, it is possible for it to store the invalid MIME type, and may eventually - consumes all memory if enough invalid MIMEs are given. + consume all memory if enough invalid MIMEs are given. Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16. }, diff --git a/modules/auxiliary/gather/vbulletin_vote_sqli.rb b/modules/auxiliary/gather/vbulletin_vote_sqli.rb index 1b083bd312..859283b1f8 100644 --- a/modules/auxiliary/gather/vbulletin_vote_sqli.rb +++ b/modules/auxiliary/gather/vbulletin_vote_sqli.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary super(update_info(info, 'Name' => 'vBulletin Password Collector via nodeid SQL Injection', 'Description' => %q{ - This module exploits a SQL Injection vulnerability found in vBulletin 5 that has been + This module exploits a SQL injection vulnerability found in vBulletin 5 that has been used in the wild since March 2013. This module can be used to extract the web application's usernames and hashes, which could be used to authenticate into the vBulletin admin control panel. diff --git a/modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb b/modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb index 998b4996b1..44ee6388a8 100644 --- a/modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb +++ b/modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection', 'Description' => %q{ - This module exploits a SQL Injection vulnerability found in vBulletin 5 that has + This module exploits a SQL injection vulnerability found in vBulletin 5 that has been used in the wild since March 2013. This module uses the sqli to extract the web application's usernames and hashes. With the retrieved information tries to log into the admin control panel in order to deploy the PHP payload. This module diff --git a/modules/post/windows/gather/forensics/browser_history.rb b/modules/post/windows/gather/forensics/browser_history.rb index 6b27348f02..486fa3bb51 100644 --- a/modules/post/windows/gather/forensics/browser_history.rb +++ b/modules/post/windows/gather/forensics/browser_history.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post super( update_info( info, 'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts', 'Description' => %q{ - Gathers Skype chat logs, Firefox history, and Chrome history data from the victim machine. + Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine. }, 'License' => MSF_LICENSE, 'Author' => [ 'Joshua Harper (@JonValt) ' ], diff --git a/test/modules/post/test/extapi.rb b/test/modules/post/test/extapi.rb index 5ef93745dd..adca64609d 100644 --- a/test/modules/post/test/extapi.rb +++ b/test/modules/post/test/extapi.rb @@ -11,7 +11,7 @@ class Metasploit4 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Testing Meterpreter ExtAPI Stuff', + 'Name' => 'Test Meterpreter ExtAPI Stuff', 'Description' => %q{ This module will test Windows Extended API methods }, 'License' => MSF_LICENSE, 'Author' => [ 'Ben Campbell'],