diff --git a/modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb b/modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb index 9cfcaccc33..dc3d75b7ac 100644 --- a/modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb +++ b/modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb @@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Wordpress MailPoet (wysija-newsletters) unauthenticated file upload', + 'Name' => 'Wordpress MailPoet (wysija-newsletters) Unauthenticated file Upload', 'Description' => %q{ The Wordpress plugin "MailPoet Newsletters" (wysija-newsletters) before 2.6.7 is vulnerable to an unauthenticated file upload. The plugin used the admin_init @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ - 'Marc-Alexandre Montpas', # initial discovery + 'Marc-Alexandre Montpas', # initial discovery 'Christian Mehlmauer' # metasploit module ], 'License' => MSF_LICENSE,