Land #3928, release fixes

bug/bundler_fix
William Vu 2014-10-01 17:21:08 -05:00
commit 5df614d39b
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
3 changed files with 4 additions and 4 deletions

View File

@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
The WordPress custom-contact-forms plugin <= 5.1.0.3 allows unauthenticated users to download
a SQL dump of the plugins database tables. It's also possible to upload files containing
sql statements which will be executed. The module first tries to extract the WordPress
SQL statements which will be executed. The module first tries to extract the WordPress
table prefix from the dump and then attempts to create a new admin user.
},
'Author' =>
'Author' =>
[
'Marc-Alexandre Montpas', # Vulnerability discovery
'Christian Mehlmauer' # Metasploit module

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
vulnerability exists in the pmd service, due to the insecure usage of functions like
strcpy and strcat while handling stack_option packets with user controlled data. In
order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from
the stack and finally build the rop chain to avoid NX.
the stack and finally build the ROP chain to avoid NX.
},
'Author' =>
[

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'ManageEngine OpManager / Social IT Arbitrary File Upload',
'Name' => 'ManageEngine OpManager and Social IT Arbitrary File Upload',
'Description' => %q{
This module exploits a file upload vulnerability in ManageEngine OpManager and Social IT.
The vulnerability exists in the FileCollector servlet which accepts unauthenticated