Updated documentation and fixed module header. Whoops, copy/paste fail.
parent
f4bb1d6a37
commit
7a12e446a0
|
@ -1,8 +1,10 @@
|
|||
## Vulnerable Application
|
||||
|
||||
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
|
||||
This module will setup an SMTP server expecting a connection from SysGauge 1.5.18
|
||||
via its SMTP server validation. The module sends a malicious response along in the
|
||||
220 service ready response and exploits the client resulting in an unprivileged shell.
|
||||
220 service ready response and exploits the client, resulting in an unprivileged shell.
|
||||
|
||||
he software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
|
|
|
@ -2,10 +2,6 @@
|
|||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
#
|
||||
# Fuzzer written by corelanc0d3r - <peter.ve [at] corelan.be>
|
||||
# http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/
|
||||
#
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
include Msf::Exploit::Remote::TcpServer
|
||||
|
|
Loading…
Reference in New Issue