From 241786e71f6198f9737df07578a6479422086c0d Mon Sep 17 00:00:00 2001 From: Pearce Barry Date: Tue, 20 Jun 2017 15:32:08 -0500 Subject: [PATCH] Update description with tested versions. --- modules/exploits/windows/http/manage_engine_opmanager_rce.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/manage_engine_opmanager_rce.rb b/modules/exploits/windows/http/manage_engine_opmanager_rce.rb index 327810f60e..2ed731adfd 100644 --- a/modules/exploits/windows/http/manage_engine_opmanager_rce.rb +++ b/modules/exploits/windows/http/manage_engine_opmanager_rce.rb @@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote has a default password of "plugin" which can not be reset through the user interface. By log-in and abusing the default administrator's SQL query functionality, it's possible to write a WAR payload to disk and trigger an automatic deployment of this payload. This - module has been tested successfully on OpManager v11.5 and v11.6 for Windows. + module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows. }, 'License' => MSF_LICENSE, 'Author' =>