Correct phpMyAdmin

unstable
Meatballs 2013-04-26 23:38:27 +01:00
parent 6bb2af7cee
commit cd842df3e2
1 changed files with 2 additions and 2 deletions

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'phpMyAdmin Authenticated Remote Code Execution via preg_replace()',
'Description' => %q{
This module exploits a PREG_REPLACE EVAL vulnerability in PhpMyAdmin's
This module exploits a PREG_REPLACE EVAL vulnerability in phpMyAdmin's
replace_prefix_tbl in libraries/mult_submits.inc.php via db_settings.php
},
'Author' =>
@ -93,7 +93,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
print_status("Grabbing CSRF token")
print_status("Grabbing CSRF token...")
response = send_request_cgi({ 'uri' => uri})
if response.nil?
fail_with(Exploit::Failure::NotFound, "Failed to retrieve webpage.")