Land #2041, title and description cleanup

unstable
William Vu 2013-07-01 15:55:13 -05:00
commit be1a0d3cae
7 changed files with 19 additions and 13 deletions

View File

@ -17,8 +17,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'Canon Wireless Printer Denial Of Service',
'Description' => %q{
The HTTP management interface on several models of Canon Wireless printers
allows for a Denial of Service condition via a crafted HTTP request. This
requires the device to be turned off and back on again to restore use.
allows for a Denial of Service (DoS) condition via a crafted HTTP request. Note:
if this module is successful, the device can only be recovered with a physical
power cycle.
},
'License' => MSF_LICENSE,
'Author' =>

View File

@ -16,7 +16,11 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'SMTP Open Relay Detection',
'Description' => 'SMTP Open Relay Detection',
'Description' => %q{
This module tests if an SMTP server will accept (via a code 250)
an e-mail from the provided FROM: address. If successful, a random
e-mail message may be sent to the named RCPT: address.
},
'References' =>
[
['URL', 'http://www.ietf.org/rfc/rfc2821.txt'],
@ -66,4 +70,4 @@ class Metasploit3 < Msf::Auxiliary
print_status "#{peer} - No relay detected"
end
end
end
end

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Carberp Web Panel C2 Backdoor Remote PHP Code Execution',
'Description' => %q{
This module exploits backdoors that can be sighted all over the leaked
This module exploits backdoors that can be found all over the leaked
source code of the Carberp botnet C2 Web Panel.
},
'License' => MSF_LICENSE,

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "LibrettoCMS File Manager Arbitary File Upload Vulnerability",
'Description' => %q{
This module exploits a file upload vulnerability found in LibrettoCMS 1.1.7, and
possibly prior. Attackers bypass the file extension check and abuse the upload
possibly prior. Attackers can bypass the file extension check and abuse the upload
feature in order to upload a malicious PHP file without authentication, which
results in arbitary remote code execution.
},
@ -149,4 +149,4 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("#{peer} - Executing #{new_fname}...")
exec(base, new_fname)
end
end
end

View File

@ -20,10 +20,11 @@ class Metasploit3 < Msf::Exploit::Remote
exists on the manage of the twikidraw actions, where a traversal path can be used
in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi
configurations by overwriting moin.wsgi, which allows to execute arbitrary python
code, as exploited in the wild on July, 2012. The user is warned to use this module
at his own risk since it's going to overwrite the moin.wsgi file, required for the
correct working of the MoinMoin wiki. While the exploit will try to restore the
attacked application at post exploitation, correct working after all isn't granted.
code, as exploited in the wild on July, 2012. This module is "ManualRanking," and
the user is warned to use this module at his own risk since it will overwrite the
moin.wsgi file, required for the correct working of the MoinMoin wiki. While the
exploit will try to restore the attacked application at post exploitation, successful
restoration cannot be guaranteed.
},
'Author' =>
[

View File

@ -9,7 +9,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Manage - Trojanize Support Account',
'Name' => 'Windows Manage Trojanize Support Account',
'Description' => %q{
This module enables alternative access to servers and workstations
by modifying the support account's properties. It will enable

View File

@ -287,7 +287,7 @@ class Msftidy
next
elsif %w{pbot}.include?(word)
elsif word =~ /^[a-z]+$/
warn("Improper capitalization in module title: '#{word}'")
warn("Suspect capitalization in module title: '#{word}'")
end
end
end