Skip to content

Commit

Permalink
Merge pull request #3667 from todb-r7/fix-release
Browse files Browse the repository at this point in the history
Release fixes: Minor caps, grammar, desc fixes
  • Loading branch information
cdoughty-r7 committed Aug 18, 2014
2 parents 6792ded + cad2814 commit 5fac151
Show file tree
Hide file tree
Showing 6 changed files with 17 additions and 7 deletions.
4 changes: 2 additions & 2 deletions modules/auxiliary/analyze/jtr_postgres_fast.rb
Expand Up @@ -64,7 +64,7 @@ def run
print_status line.chomp
end

print_status "Cracked Passwords this run:"
print_status "Cracked passwords this run:"
cracker_instance.each_cracked_password do |password_line|
password_line.chomp!
next if password_line.blank?
Expand Down Expand Up @@ -113,7 +113,7 @@ def hash_file
end
end
hashlist.close
print_status "Hashes Written out to #{hashlist.path}"
print_status "Hashes written out to #{hashlist.path}"
hashlist.path
end

Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/multi/http/gitlab_shell_exec.rb
Expand Up @@ -20,7 +20,7 @@ def initialize(info = {})
ssh keys in the gitlab-shell functionality of Gitlab. Versions
of gitlab-shell prior to 1.7.4 used the ssh key provided directly
in a system call resulting in a command injection vulnerability. As
this relies on adding an ssh key to an account valid credentials
this relies on adding an ssh key to an account, valid credentials
are required to exploit this vulnerability.
),
'Author' =>
Expand Down
12 changes: 11 additions & 1 deletion modules/exploits/unix/http/vmturbo_vmtadmin_exec_noauth.rb
Expand Up @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote

def initialize(info = {})
super(update_info(info,
'Name' => 'VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution',
'Name' => 'VMTurbo Operations Manager vmtadmin.cgi Remote Command Execution',
'Description' => %q{
VMTurbo Operations Manager 4.6 and prior are vulnerable to unauthenticated
OS Command injection in the web interface. Use reverse payloads for the most
Expand Down Expand Up @@ -93,6 +93,16 @@ def check
return Exploit::CheckCode::Unknown
end

# NOTE (@todb): This PHP style comparison seems incorrect, since
# strings are being compared and not numbers. Example:
# 1.9.3p547 :001 > a = "4.6"
# => "4.6"
# 1.9.3p547 :002 > b = "10.6"
# => "10.6"
# 1.9.3p547 :003 > a <= b
#
# Also, the description says 4.5 is also vuln. This doesn't
# appear to care.
if version and version <= "4.6" and build < "28657"
return Exploit::CheckCode::Appears
else
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/windows/local/mqac_write.rb
Expand Up @@ -160,7 +160,7 @@ def exploit
session.railgun.ntdll.NtQueryIntervalProfile(1337, 4)

unless is_system?
print_error('Exploit failed')
print_error('Did not get system, exploit failed')
return
end

Expand Down
Expand Up @@ -40,7 +40,7 @@ def initialize(info={})
'Description' => %q{
This module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The
vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a
sequence of specially crafted of rendering messages, a virtual machine can exploit an out
sequence of specially crafted rendering messages, a virtual machine can exploit an out
of bounds array access to corrupt memory and escape to the host. This module has been
tested successfully on Windows 7 SP1 (64 bits) as Host running Virtual Box 4.3.6.
},
Expand Down
2 changes: 1 addition & 1 deletion modules/post/linux/gather/gnome_commander_creds.rb
Expand Up @@ -50,7 +50,7 @@ def run
vprint_line(str_file)
#Store file
p = store_loot("connections", "text/plain", session, str_file, connections_file, "Gnome-Commander connections")
print_good ("Connections file saved to #{p}")
print_good("Connections file saved to #{p}")
rescue EOFError
# If there's nothing in the file, we hit EOFError
print_error("Nothing read from file: #{connections_file}, file may be empty")
Expand Down

0 comments on commit 5fac151

Please sign in to comment.