From aa5dc0a354e1dc97a4e4edd9d1a9b0a5386d042b Mon Sep 17 00:00:00 2001 From: sinn3r Date: Mon, 27 Oct 2014 10:24:11 -0500 Subject: [PATCH] 100 columns per line --- modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb b/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb index 280fdab41e..80464c707f 100644 --- a/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb +++ b/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb @@ -15,8 +15,8 @@ class Metasploit4 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection', 'Description' => %q( - This module exploits the code injection flaw known as shellshock which - leverages specially crafted environment variables in Bash. + This module exploits the code injection flaw known as shellshock which leverages specially + crafted environment variables in Bash. Please note that this exploit specifically targets Pure-FTPd compiled with the --with-extauth flag, and an external bash program for authentication. If the server is not set up this way,