diff --git a/modules/exploits/multi/misc/stunshell_exec.rb b/modules/exploits/multi/misc/stunshell_exec.rb index 4050efa0c6..a1412a513c 100644 --- a/modules/exploits/multi/misc/stunshell_exec.rb +++ b/modules/exploits/multi/misc/stunshell_exec.rb @@ -1,3 +1,10 @@ +## +# This file is part of the Metasploit Framework and may be subject to +# redistribution and commercial restrictions. Please see the Metasploit +# web site for more information on licensing and terms of use. +# http://metasploit.com/ +## + require 'msf/core' class Metasploit3 < Msf::Exploit::Remote @@ -8,8 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => '"STUNSHELL" Web Shell Remote Code Execution', 'Description' => %q{ - This module exploits unauthenticated versions of the "STUNSHELL" web shell. This - module works when safe mode is disabled on the web server. This shell is widely + This module exploits unauthenticated versions of the "STUNSHELL" web shell. This + module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads. }, 'License' => MSF_LICENSE, @@ -36,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Platform' => ['unix', 'win'], 'Arch' => ARCH_CMD, 'Targets' => [['Automatic',{}]], - 'DisclosureDate' => 'March 23 2013', + 'DisclosureDate' => 'Mar 23 2013', 'DefaultTarget' => 0)) register_options(