From 4ee05313d8abb46e0ca6c1a46b5319b406ee6787 Mon Sep 17 00:00:00 2001 From: Mehmet Ince Date: Wed, 8 Feb 2017 19:31:01 +0300 Subject: [PATCH] Update tested version numbers --- modules/exploits/linux/http/alienvault_exec.rb | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/http/alienvault_exec.rb b/modules/exploits/linux/http/alienvault_exec.rb index ea969bc932..2b6d83abea 100644 --- a/modules/exploits/linux/http/alienvault_exec.rb +++ b/modules/exploits/linux/http/alienvault_exec.rb @@ -24,7 +24,9 @@ class MetasploitModule < Msf::Exploit::Remote SSH login attempt with a invalid credentials can trigger a created rogue policy which triggers an action that executes operating system command with root user privileges. - This module was tested against AlienVault USM 5.2.5. + This module was tested against following product and versions: + AlienVault USM 5.3.0, 5.2.5, 5.0.0, 4.15.11, 4.5.0 + AlienVault OSSIM 5.0.0, 4.6.1 }, 'License' => MSF_LICENSE, 'Author' => @@ -47,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Arch' => ARCH_PYTHON, 'Targets' => [ - ['Alienvault OSSIM 5.3.1', {}] + ['Alienvault USM/OSSIM <= 5.3.0', {}] ], 'Privileged' => true, 'DisclosureDate' => "Jan 31 2017",