Land #2041, title and description cleanup
commit
be1a0d3cae
|
@ -17,8 +17,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => 'Canon Wireless Printer Denial Of Service',
|
||||
'Description' => %q{
|
||||
The HTTP management interface on several models of Canon Wireless printers
|
||||
allows for a Denial of Service condition via a crafted HTTP request. This
|
||||
requires the device to be turned off and back on again to restore use.
|
||||
allows for a Denial of Service (DoS) condition via a crafted HTTP request. Note:
|
||||
if this module is successful, the device can only be recovered with a physical
|
||||
power cycle.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -16,7 +16,11 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'SMTP Open Relay Detection',
|
||||
'Description' => 'SMTP Open Relay Detection',
|
||||
'Description' => %q{
|
||||
This module tests if an SMTP server will accept (via a code 250)
|
||||
an e-mail from the provided FROM: address. If successful, a random
|
||||
e-mail message may be sent to the named RCPT: address.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://www.ietf.org/rfc/rfc2821.txt'],
|
||||
|
@ -66,4 +70,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
print_status "#{peer} - No relay detected"
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Carberp Web Panel C2 Backdoor Remote PHP Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits backdoors that can be sighted all over the leaked
|
||||
This module exploits backdoors that can be found all over the leaked
|
||||
source code of the Carberp botnet C2 Web Panel.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => "LibrettoCMS File Manager Arbitary File Upload Vulnerability",
|
||||
'Description' => %q{
|
||||
This module exploits a file upload vulnerability found in LibrettoCMS 1.1.7, and
|
||||
possibly prior. Attackers bypass the file extension check and abuse the upload
|
||||
possibly prior. Attackers can bypass the file extension check and abuse the upload
|
||||
feature in order to upload a malicious PHP file without authentication, which
|
||||
results in arbitary remote code execution.
|
||||
},
|
||||
|
@ -149,4 +149,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
print_status("#{peer} - Executing #{new_fname}...")
|
||||
exec(base, new_fname)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -20,10 +20,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
exists on the manage of the twikidraw actions, where a traversal path can be used
|
||||
in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi
|
||||
configurations by overwriting moin.wsgi, which allows to execute arbitrary python
|
||||
code, as exploited in the wild on July, 2012. The user is warned to use this module
|
||||
at his own risk since it's going to overwrite the moin.wsgi file, required for the
|
||||
correct working of the MoinMoin wiki. While the exploit will try to restore the
|
||||
attacked application at post exploitation, correct working after all isn't granted.
|
||||
code, as exploited in the wild on July, 2012. This module is "ManualRanking," and
|
||||
the user is warned to use this module at his own risk since it will overwrite the
|
||||
moin.wsgi file, required for the correct working of the MoinMoin wiki. While the
|
||||
exploit will try to restore the attacked application at post exploitation, successful
|
||||
restoration cannot be guaranteed.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -9,7 +9,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Manage - Trojanize Support Account',
|
||||
'Name' => 'Windows Manage Trojanize Support Account',
|
||||
'Description' => %q{
|
||||
This module enables alternative access to servers and workstations
|
||||
by modifying the support account's properties. It will enable
|
||||
|
|
|
@ -287,7 +287,7 @@ class Msftidy
|
|||
next
|
||||
elsif %w{pbot}.include?(word)
|
||||
elsif word =~ /^[a-z]+$/
|
||||
warn("Improper capitalization in module title: '#{word}'")
|
||||
warn("Suspect capitalization in module title: '#{word}'")
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue