From 8f6457661d63f521f7fc2ea6e2cc77c71a1b2a8a Mon Sep 17 00:00:00 2001 From: sinn3r Date: Sun, 10 Jun 2012 01:52:26 -0500 Subject: [PATCH] Change description --- .../linux/http/symantec_web_gateway_file_upload.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb index 2dfc8296bd..474fd1bf85 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb @@ -17,9 +17,10 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => "Symantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload Vulnerability", 'Description' => %q{ This module exploits a file upload vulnerability found in Symantec Web Gateway's - HTTP service due to the incorrect manage of file extensions in the upload_file() - function. This module abuses the spywall/blocked_file.php file to upload an arbitrary - php file without any authentication, which results in arbitrary code execution. + HTTP service. Due to the incorrect use of file extensions in the upload_file() + function, this allows us to abuse the spywall/blocked_file.php file in order to + upload a malicious PHP file without any authentication, which results in arbitrary + code execution. }, 'License' => MSF_LICENSE, 'Author' => @@ -122,5 +123,4 @@ class Metasploit3 < Msf::Exploit::Remote end end - end