Update ranking and description

bug/bundler_fix
jvazquez-r7 2013-09-04 16:10:15 -05:00
parent 94125a434b
commit 34b3ee5e17
1 changed files with 5 additions and 3 deletions

View File

@ -8,7 +8,7 @@
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
Rank = ManualRanking
HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] }
@ -23,8 +23,10 @@ class Metasploit3 < Msf::Exploit::Remote
The vulnerability exists on the opcactivate.vbs script, which
is reachable from the APIBSMIntegrationImpl AXIS service, and
uses WScript.Shell.run() to execute cmd.exe with user provided
data. The module has been tested successfully on HP SiteScope
11.20 over Windows 2003 SP2.
data. Note which the opcactivate.vbs component is installed
with the (optional) HP Operations Agent component. The module
has been tested successfully on HP SiteScope 11.20 (with HP
Operations Agent) over Windows 2003 SP2.
},
'Author' =>
[