Minor caps, grammar, desc fixes

bug/bundler_fix
Tod Beardsley 2014-08-18 13:35:34 -05:00
parent 7c1605efe4
commit cad281494f
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
6 changed files with 17 additions and 7 deletions

View File

@ -64,7 +64,7 @@ class Metasploit3 < Msf::Auxiliary
print_status line.chomp
end
print_status "Cracked Passwords this run:"
print_status "Cracked passwords this run:"
cracker_instance.each_cracked_password do |password_line|
password_line.chomp!
next if password_line.blank?
@ -113,7 +113,7 @@ class Metasploit3 < Msf::Auxiliary
end
end
hashlist.close
print_status "Hashes Written out to #{hashlist.path}"
print_status "Hashes written out to #{hashlist.path}"
hashlist.path
end

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
ssh keys in the gitlab-shell functionality of Gitlab. Versions
of gitlab-shell prior to 1.7.4 used the ssh key provided directly
in a system call resulting in a command injection vulnerability. As
this relies on adding an ssh key to an account valid credentials
this relies on adding an ssh key to an account, valid credentials
are required to exploit this vulnerability.
),
'Author' =>

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution',
'Name' => 'VMTurbo Operations Manager vmtadmin.cgi Remote Command Execution',
'Description' => %q{
VMTurbo Operations Manager 4.6 and prior are vulnerable to unauthenticated
OS Command injection in the web interface. Use reverse payloads for the most
@ -93,6 +93,16 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Unknown
end
# NOTE (@todb): This PHP style comparison seems incorrect, since
# strings are being compared and not numbers. Example:
# 1.9.3p547 :001 > a = "4.6"
# => "4.6"
# 1.9.3p547 :002 > b = "10.6"
# => "10.6"
# 1.9.3p547 :003 > a <= b
#
# Also, the description says 4.5 is also vuln. This doesn't
# appear to care.
if version and version <= "4.6" and build < "28657"
return Exploit::CheckCode::Appears
else

View File

@ -160,7 +160,7 @@ class Metasploit3 < Msf::Exploit::Local
session.railgun.ntdll.NtQueryIntervalProfile(1337, 4)
unless is_system?
print_error('Exploit failed')
print_error('Did not get system, exploit failed')
return
end

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Local
'Description' => %q{
This module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The
vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a
sequence of specially crafted of rendering messages, a virtual machine can exploit an out
sequence of specially crafted rendering messages, a virtual machine can exploit an out
of bounds array access to corrupt memory and escape to the host. This module has been
tested successfully on Windows 7 SP1 (64 bits) as Host running Virtual Box 4.3.6.
},

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Post
vprint_line(str_file)
#Store file
p = store_loot("connections", "text/plain", session, str_file, connections_file, "Gnome-Commander connections")
print_good ("Connections file saved to #{p}")
print_good("Connections file saved to #{p}")
rescue EOFError
# If there's nothing in the file, we hit EOFError
print_error("Nothing read from file: #{connections_file}, file may be empty")