From 15ffae4ae8bd1d6a8e707ddaea24629a8534ea97 Mon Sep 17 00:00:00 2001 From: join-us Date: Sat, 30 Apr 2016 00:17:26 +0800 Subject: [PATCH] rename module name --- modules/exploits/multi/http/struts_dmi_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/struts_dmi_exec.rb b/modules/exploits/multi/http/struts_dmi_exec.rb index f483268b4c..6421334ff3 100644 --- a/modules/exploits/multi/http/struts_dmi_exec.rb +++ b/modules/exploits/multi/http/struts_dmi_exec.rb @@ -14,7 +14,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Apache Struts ParametersInterceptor Remote Code Execution', + 'Name' => 'Apache Struts Dynamic Method Invocation Remote Code Execution', 'Description' => %q{ This module exploits a remote command execution vulnerability in Apache Struts version between 2.3.20 and 2.3.28 (except 2.3.20.2 and 2.3.24.2). Remote Code