From 267642aa4b9f60f78bbade68b2ee572a88a34529 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Mon, 23 Jun 2014 09:20:47 -0500 Subject: [PATCH] Fix description --- modules/exploits/windows/http/hp_autopass_license_traversal.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/hp_autopass_license_traversal.rb b/modules/exploits/windows/http/hp_autopass_license_traversal.rb index 7f8f0cf6ad..cdc4b3bc90 100644 --- a/modules/exploits/windows/http/hp_autopass_license_traversal.rb +++ b/modules/exploits/windows/http/hp_autopass_license_traversal.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote authentication in the CommunicationServlet component. On the other hand, it's possible to abuse a directory traversal when uploading files thorough the same component, allowing to upload an arbitrary payload embedded in a JSP. The module has been tested successfully on - HP AutoPass License Server installed with HP Service Virtualization 3.50. + HP AutoPass License Server 8.01 as installed with HP Service Virtualization 3.50. }, 'Author' => [