Pff, and of course, I had to make a typo on that one
parent
1a4d3f849c
commit
4bf674ece6
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a SQL injection found in Solarwinds Storage Manager
|
||||
login interface. It will send a malicious SQL query to create a JSP file
|
||||
under the web root directory, and then let it download and execute out malicious
|
||||
under the web root directory, and then let it download and execute our malicious
|
||||
executable under the context of SYSTEM.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
Loading…
Reference in New Issue