Fixing print message in snort module
parent
a579709bac
commit
ae59f03ac9
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a file upload vulnerability found in Symantec Web Gateway's
|
||||
HTTP service. Due to the incorrect use of file extensions in the upload_file()
|
||||
function, this allows us to abuse the spywall/blocked_file.php file in order to
|
||||
function, attackers may to abuse the spywall/blocked_file.php file in order to
|
||||
upload a malicious PHP file without any authentication, which results in arbitrary
|
||||
code execution.
|
||||
},
|
||||
|
|
|
@ -96,7 +96,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
p = buildpacket(shost, rhost, rport.to_i)
|
||||
|
||||
print_status("Sending crafted SMB packet from #{shost} to #{rhost}:#{rport}...")
|
||||
print_status("#{rhost}:#{rport} Sending crafted SMB packet from #{shost}...")
|
||||
|
||||
capture_sendto(p, rhost)
|
||||
|
||||
|
|
Loading…
Reference in New Issue