Update ranking and description
parent
94125a434b
commit
34b3ee5e17
|
@ -8,7 +8,7 @@
|
|||
require 'msf/core'
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = GoodRanking
|
||||
Rank = ManualRanking
|
||||
|
||||
HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] }
|
||||
|
||||
|
@ -23,8 +23,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
The vulnerability exists on the opcactivate.vbs script, which
|
||||
is reachable from the APIBSMIntegrationImpl AXIS service, and
|
||||
uses WScript.Shell.run() to execute cmd.exe with user provided
|
||||
data. The module has been tested successfully on HP SiteScope
|
||||
11.20 over Windows 2003 SP2.
|
||||
data. Note which the opcactivate.vbs component is installed
|
||||
with the (optional) HP Operations Agent component. The module
|
||||
has been tested successfully on HP SiteScope 11.20 (with HP
|
||||
Operations Agent) over Windows 2003 SP2.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue