From e8913e56202a1637f69f2424e8c40a788b7500a4 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Wed, 6 May 2015 14:47:08 -0500 Subject: [PATCH] Addressed most of @wvu's issues with #5312 --- modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb | 2 +- modules/auxiliary/scanner/http/goahead_traversal.rb | 4 ++-- modules/auxiliary/scanner/http/owa_iis_internal_ip.rb | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb index d593fcf36d..cf76574102 100644 --- a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb +++ b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary execution. This module will try to cause a denial-of-service. Please note that a valid file resource must be supplied for the TARGETURI option. - By default, IIS, by default, provides these resources: welcome.png, and iis-85.png. + By default, IIS, provides 'welcome.png' and 'iis-85.png' as resources. Others may also exist, depending on configuration options. }, 'Author' => diff --git a/modules/auxiliary/scanner/http/goahead_traversal.rb b/modules/auxiliary/scanner/http/goahead_traversal.rb index e33c3c8f4b..b86ac1dd64 100644 --- a/modules/auxiliary/scanner/http/goahead_traversal.rb +++ b/modules/auxiliary/scanner/http/goahead_traversal.rb @@ -16,8 +16,8 @@ class Metasploit3 < Msf::Auxiliary 'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal', 'Description' => %q{ This module exploits a directory traversal vulnerability in the Embedthis - GoAhead Web Server v3.4.1, allowing to read arbitrary files with the web - server privileges. + GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files + with the web server privileges. }, 'References' => [ diff --git a/modules/auxiliary/scanner/http/owa_iis_internal_ip.rb b/modules/auxiliary/scanner/http/owa_iis_internal_ip.rb index 631921daac..542b5ef896 100644 --- a/modules/auxiliary/scanner/http/owa_iis_internal_ip.rb +++ b/modules/auxiliary/scanner/http/owa_iis_internal_ip.rb @@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary super( 'Name' => 'Outlook Web App (OWA) / Client Access Server (CAS) IIS HTTP Internal IP Disclosure', 'Description' => %q{ - This module tests vulnerable IIS HTTP header file paths on Microsoft Exchange OWA 2003, - CAS 2007, 2010, 2013 servers. + This module tests vulnerable IIS HTTP header file paths on Microsoft + Exchange OWA 2003 and CAS 2007, 2010, and 2013 servers. }, 'Author' => [