Pff, and of course, I had to make a typo on that one
parent
1a4d3f849c
commit
4bf674ece6
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a SQL injection found in Solarwinds Storage Manager
|
This module exploits a SQL injection found in Solarwinds Storage Manager
|
||||||
login interface. It will send a malicious SQL query to create a JSP file
|
login interface. It will send a malicious SQL query to create a JSP file
|
||||||
under the web root directory, and then let it download and execute out malicious
|
under the web root directory, and then let it download and execute our malicious
|
||||||
executable under the context of SYSTEM.
|
executable under the context of SYSTEM.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
Loading…
Reference in New Issue