Skip to content

Commit

Permalink
Merge pull request #6 from todb-r7/fixup-pr3880
Browse files Browse the repository at this point in the history
Fix description
  • Loading branch information
wvu committed Sep 24, 2014
2 parents ca63fe9 + 2f788c2 commit 2b127ea
Showing 1 changed file with 8 additions and 2 deletions.
10 changes: 8 additions & 2 deletions modules/auxiliary/admin/http/bash_env.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,15 @@ class Metasploit4 < Msf::Auxiliary

def initialize(info = {})
super(update_info(info,
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack (PoC)',
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack',
'Description' => %q{
This module exploits a vulnerability.
This module exploits a remote command injection vulnerability in bash,
a popular shell environment, over an HTTP CGI vector. By passing a specially-crafted
string that is set as an environment variable, attckers may execute arbitrary operating
system commands.
For this version of the exploit, the target must already have netcat (nc) compiled with the
-e option.
},
'Author' => ['wvu'],
'References' => [
Expand Down

0 comments on commit 2b127ea

Please sign in to comment.