Squashed commit of the following:

commit 49f480af8b9d27e676c02006ae8873a119e1aae6
Author: Tod Beardsley <tod_beardsley@rapid7.com>
Date:   Mon Apr 13 10:42:13 2015 -0500

    Fix funny punctuation on rootpipe exploit title

    See #5119

commit 0b439671efd6dabcf1a69fd0b089c28badf5ccff
Author: Tod Beardsley <tod_beardsley@rapid7.com>
Date:   Mon Apr 13 10:37:39 2015 -0500

    Fix vendor caps

    Trusting the github repo README at

    https://github.com/embedthis/goahead

    See #5101
bug/bundler_fix
Tod Beardsley 2015-04-13 10:46:47 -05:00
parent d5903ca5b2
commit d87483b28d
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
2 changed files with 5 additions and 5 deletions

View File

@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'GoAhead Embedded Web Server Directory Traversal',
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability in the EmbedThis GoAhead Web Server v3.4.1,
This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1,
allowing to read arbitrary files with the web server privileges.
},
'References' =>

View File

@ -15,12 +15,12 @@ class Metasploit4 < Msf::Exploit::Local
def initialize(info = {})
super(update_info(info,
'Name' => 'Mac OS X "Rootpipe" Privilege Escalation',
'Name' => 'Apple OS X Rootpipe Privilege Escalation',
'Description' => %q{
This module exploits a hidden backdoor API in Apple's Admin framework on
Mac OS X to escalate privileges to root. Dubbed "Rootpipe."
Mac OS X to escalate privileges to root, dupped "Rootpipe."
Tested on Yosemite 10.10.2 and should work on previous versions.
This module was tested on Yosemite 10.10.2 and should work on previous versions.
The patch for this issue was not backported to older releases.