Skip to content

Commit e84ba62

Browse files
committed
Cosmetic changes for local/webexec
1 parent 6f58a15 commit e84ba62

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

modules/exploits/windows/local/webexec.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,11 @@ class MetasploitModule < Msf::Exploit::Local
1515

1616
def initialize(info={})
1717
super( update_info( info,
18-
'Name' => 'WebEx local service permissions exploit',
18+
'Name' => 'WebEx Local Service Permissions Exploit',
1919
'Description' => %q{
20-
This module exploits a flaw in the 'webexservice' Windows service, which runs as SYSTEM, can be used to run arbitrary commands locally, and can be started by limited users in default installations.
20+
This module exploits a flaw in the 'webexservice' Windows service, which runs as SYSTEM,
21+
can be used to run arbitrary commands locally, and can be started by limited users in
22+
default installations.
2123
},
2224
'References' =>
2325
[
@@ -84,7 +86,7 @@ def check_service_exists?(service)
8486
end
8587

8688
def check
87-
if !check_service_exists?(@service_name)
89+
unless check_service_exists?(@service_name)
8890
return Exploit::CheckCode::Safe
8991
end
9092

@@ -126,7 +128,6 @@ def check_write_access(path)
126128

127129

128130
def exploit
129-
130131
begin
131132
@token = get_imperstoken
132133
rescue Rex::Post::Meterpreter::RequestError

0 commit comments

Comments
 (0)