Pff, and of course, I had to make a typo on that one

unstable
sinn3r 2012-05-03 20:34:52 -05:00
parent 1a4d3f849c
commit 4bf674ece6
1 changed files with 1 additions and 1 deletions

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{ 'Description' => %q{
This module exploits a SQL injection found in Solarwinds Storage Manager This module exploits a SQL injection found in Solarwinds Storage Manager
login interface. It will send a malicious SQL query to create a JSP file login interface. It will send a malicious SQL query to create a JSP file
under the web root directory, and then let it download and execute out malicious under the web root directory, and then let it download and execute our malicious
executable under the context of SYSTEM. executable under the context of SYSTEM.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,