Update description with tested versions.
parent
14f0409c6c
commit
241786e71f
|
@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
has a default password of "plugin" which can not be reset through the user interface. By
|
has a default password of "plugin" which can not be reset through the user interface. By
|
||||||
log-in and abusing the default administrator's SQL query functionality, it's possible to
|
log-in and abusing the default administrator's SQL query functionality, it's possible to
|
||||||
write a WAR payload to disk and trigger an automatic deployment of this payload. This
|
write a WAR payload to disk and trigger an automatic deployment of this payload. This
|
||||||
module has been tested successfully on OpManager v11.5 and v11.6 for Windows.
|
module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue