Minor fixup for release

* Adds some new refs.
  * Fixes a typo in a module desc.
  * Fixes a weird slash continuation for string building (See #2589)
bug/bundler_fix
Tod Beardsley 2013-11-04 12:10:38 -06:00
parent c5778f51d7
commit 84572c58a8
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
3 changed files with 6 additions and 3 deletions

View File

@ -30,6 +30,8 @@ class Metasploit4 < Msf::Auxiliary
'References' =>
[
['CVE', '2013-3617'],
['OSVDB', '99141'],
['BID', '63431'],
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
],
'License' => MSF_LICENSE,

View File

@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'References' =>
[
['OSVDB' => '99199'],
['BID' => '63411'],
['URL' => 'http://bugs.processmaker.com/view.php?id=13436']
],
'Payload' =>

View File

@ -19,7 +19,7 @@ class Metasploit4 < Msf::Exploit
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The
vulnerability exists in the parising of the UserName parameter in the NetConfig.ini
file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP
SP3 and Windows 7 SP1.b
SP3 and Windows 7 SP1.
},
'License' => MSF_LICENSE,
'Author' =>
@ -62,8 +62,7 @@ class Metasploit4 < Msf::Exploit
def exploit
section = datastore["SECTION"]
sploit = "[#{section}]\r\n" \
"UserName=#{shell_popper}"
sploit = "[#{section}]\r\nUserName=#{shell_popper}"
file_create(sploit)
end