Fixing print message in snort module

unstable
Tod Beardsley 2012-06-13 14:04:05 -05:00
parent a579709bac
commit ae59f03ac9
2 changed files with 2 additions and 2 deletions

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a file upload vulnerability found in Symantec Web Gateway's
HTTP service. Due to the incorrect use of file extensions in the upload_file()
function, this allows us to abuse the spywall/blocked_file.php file in order to
function, attackers may to abuse the spywall/blocked_file.php file in order to
upload a malicious PHP file without any authentication, which results in arbitrary
code execution.
},

View File

@ -96,7 +96,7 @@ class Metasploit3 < Msf::Exploit::Remote
p = buildpacket(shost, rhost, rport.to_i)
print_status("Sending crafted SMB packet from #{shost} to #{rhost}:#{rport}...")
print_status("#{rhost}:#{rport} Sending crafted SMB packet from #{shost}...")
capture_sendto(p, rhost)