From 476a3a276fa5e24d112741162c95960166025b31 Mon Sep 17 00:00:00 2001 From: Shelby Pace Date: Tue, 10 Jul 2018 14:12:02 -0500 Subject: [PATCH] modified capitalization and wording --- .../modules/exploit/multi/http/monstra_fileupload_exec.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/documentation/modules/exploit/multi/http/monstra_fileupload_exec.md b/documentation/modules/exploit/multi/http/monstra_fileupload_exec.md index 247174c438..c7c60922da 100644 --- a/documentation/modules/exploit/multi/http/monstra_fileupload_exec.md +++ b/documentation/modules/exploit/multi/http/monstra_fileupload_exec.md @@ -1,12 +1,12 @@ ## Description -MonstraCMS 3.0.4 allows users to upload Arbitrary files which leads to a remote command execution on the remote server, an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. +MonstraCMS 3.0.4 allows users to upload arbitrary files which leads to remote command execution on the remote server. An attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This module was tested against MonstraCMS 3.0.4. Additional information and vulnerabilities can be viewed on Exploit-DB [43348](https://www.exploit-db.com/exploits/43348/). ## Vulnerable Application Available at [Exploit-DB](https://www.exploit-db.com/apps/23663fc7b47c4c1e476b793ea53660bc-monstra-3.0.4.zip) -### Vulnerable Application Installation Setup. +### Vulnerable Application Installation Setup 1. Download Application : `https://www.exploit-db.com/apps/23663fc7b47c4c1e476b793ea53660bc-monstra-3.0.4.zip` 2. Extract : `23663fc7b47c4c1e476b793ea53660bc-monstra-3.0.4.zip` 3. Move In WebDirectory : `C:\xampp\htdocs\`