Land #4011, module description cleanup

bug/bundler_fix
William Vu 2014-10-14 12:43:17 -05:00
commit 972efd423c
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
4 changed files with 6 additions and 6 deletions

View File

@ -19,8 +19,8 @@ class Metasploit3 < Msf::Auxiliary
super( super(
'Name' => 'HP Operations Manager Perfd Environment Scanner', 'Name' => 'HP Operations Manager Perfd Environment Scanner',
'Description' => %q{ 'Description' => %q{
This module will enumerate the environment This module will enumerate the process list of a remote machine by abusing
HP Operation Manager via daemon perfd. HP Operation Manager's unauthenticated 'perfd' daemon.
}, },
'Author' => [ 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ], 'Author' => [ 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Jenkins-CI Login Utility', 'Name' => 'Jenkins-CI Login Utility',
'Description' => 'This module simply attempts to login to a Jenkins-CI instance using a specific user/pass.', 'Description' => 'This module attempts to login to a Jenkins-CI instance using a specific user/pass.',
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ], 'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -67,7 +67,7 @@ class Metasploit3 < Msf::Auxiliary
print_good "#{ip}:#{rport} - LOGIN SUCCESSFUL: #{result.credential}" print_good "#{ip}:#{rport} - LOGIN SUCCESSFUL: #{result.credential}"
else else
invalidate_login(credential_data) invalidate_login(credential_data)
print_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})" vprint_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})"
end end
end end
end end

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'Wordpress InfusionSoft Upload Vulnerability', 'Name' => 'Wordpress InfusionSoft Upload Vulnerability',
'Description' => %q{ 'Description' => %q{
This module exploits an arbitrary PHP code upload in the wordpress Infusionsoft Gravity This module exploits an arbitrary PHP code upload in the WordPress Infusionsoft Gravity
Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file
upload and remote code execution. upload and remote code execution.
}, },

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "Rejetto HttpFileServer Remote Command Execution", 'Name' => "Rejetto HttpFileServer Remote Command Execution",
'Description' => %q{ 'Description' => %q{
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a
poor regex in the file ParserLib.pas. This module exploit the HFS scripting commands by poor regex in the file ParserLib.pas. This module exploits the HFS scripting commands by
using '%00' to bypass the filtering. This module has been tested successfully on HFS 2.3b using '%00' to bypass the filtering. This module has been tested successfully on HFS 2.3b
over Windows XP SP3, Windows 7 SP1 and Windows 8. over Windows XP SP3, Windows 7 SP1 and Windows 8.
}, },