Skip to content

Commit 899840c

Browse files
authored
Merge pull request rapid7#20295 from bwatters-r7/fix/thinmanager-spaces
Fix some spacing issues
2 parents 12d4527 + b1d5319 commit 899840c

File tree

4 files changed

+17
-13
lines changed

4 files changed

+17
-13
lines changed

modules/auxiliary/admin/networking/thinmanager_traversal_delete.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,10 @@ def initialize(info = {})
1414
info,
1515
'Name' => 'ThinManager Path Traversal (CVE-2023-2915) Arbitrary File Delete',
1616
'Description' => %q{
17-
This module exploits a path traversal vulnerability (CVE-2023-2915) in ThinManager <= v13.1.0 to delete arbitrary files from the system.
18-
19-
The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\SYSTEM.
17+
This module exploits a path traversal vulnerability (CVE-2023-2915) in
18+
ThinManager <= v13.1.0 to delete arbitrary files from the system.
19+
The affected service listens by default on TCP port 2031 and runs in the
20+
context of NT AUTHORITY\SYSTEM.
2021
},
2122
'Author' => [
2223
'Michael Heinzl', # MSF Module

modules/auxiliary/admin/networking/thinmanager_traversal_upload.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,10 @@ def initialize(info = {})
1414
info,
1515
'Name' => 'ThinManager Path Traversal (CVE-2023-27855) Arbitrary File Upload',
1616
'Description' => %q{
17-
This module exploits a path traversal vulnerability (CVE-2023-27855 ) in ThinManager <= v13.0.1 to upload arbitrary files to the target system.
18-
19-
The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\SYSTEM.
17+
This module exploits a path traversal vulnerability (CVE-2023-27855) in
18+
ThinManager <= v13.0.1 to upload arbitrary files to the target system.
19+
The affected service listens by default on TCP port 2031 and runs in the
20+
context of NT AUTHORITY\SYSTEM.
2021
},
2122
'Author' => [
2223
'Michael Heinzl', # MSF Module

modules/auxiliary/admin/networking/thinmanager_traversal_upload2.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,18 @@ def initialize(info = {})
1414
info,
1515
'Name' => 'ThinManager Path Traversal (CVE-2023-2917) Arbitrary File Upload',
1616
'Description' => %q{
17-
This module exploits a path traversal vulnerability (CVE-2023-2917) in ThinManager <= v13.1.0 to upload arbitrary files to the target system.
18-
19-
The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\SYSTEM.
17+
This module exploits a path traversal vulnerability (CVE-2023-2917) in
18+
ThinManager <= v13.1.0 to upload arbitrary files to the target system.
19+
The affected service listens by default on TCP port 2031 and runs in the
20+
context of NT AUTHORITY\SYSTEM.
2021
},
2122
'Author' => [
2223
'Michael Heinzl', # MSF Module
2324
'Tenable' # Discovery and PoC
2425
],
2526
'License' => MSF_LICENSE,
2627
'References' => [
27-
['CVE', '2023-2917 '],
28+
['CVE', '2023-2917'],
2829
['URL', 'https://www.tenable.com/security/research/tra-2023-28'],
2930
['URL', 'https://support.rockwellautomation.com/app/answers/answer_view/a_id/1140471']
3031
],

modules/auxiliary/gather/thinmanager_traversal_download.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,10 @@ def initialize(info = {})
1414
info,
1515
'Name' => 'ThinManager Path Traversal (CVE-2023-27856) Arbitrary File Download',
1616
'Description' => %q{
17-
This module exploits a path traversal vulnerability (CVE-2023-27856) in ThinManager <= v13.0.1 to retrieve arbitrary files from the system.
18-
19-
The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\SYSTEM.
17+
This module exploits a path traversal vulnerability (CVE-2023-27856) in
18+
ThinManager <= v13.0.1 to retrieve arbitrary files from the system.
19+
The affected service listens by default on TCP port 2031 and runs in the
20+
context of NT AUTHORITY\SYSTEM.
2021
},
2122
'Author' => [
2223
'Michael Heinzl', # MSF Module

0 commit comments

Comments
 (0)