Updated documentation and fixed module header. Whoops, copy/paste fail.

bug/bundler_fix
Chris Higgins 2017-03-16 21:28:24 -05:00
parent f4bb1d6a37
commit 7a12e446a0
2 changed files with 4 additions and 6 deletions

View File

@ -1,8 +1,10 @@
## Vulnerable Application
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
This module will setup an SMTP server expecting a connection from SysGauge 1.5.18
via its SMTP server validation. The module sends a malicious response along in the
220 service ready response and exploits the client resulting in an unprivileged shell.
220 service ready response and exploits the client, resulting in an unprivileged shell.
he software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe).
## Verification Steps

View File

@ -2,10 +2,6 @@
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
#
# Fuzzer written by corelanc0d3r - <peter.ve [at] corelan.be>
# http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/
#
##
class MetasploitModule < Msf::Exploit::Remote
include Msf::Exploit::Remote::TcpServer