From 0cb555f28d09634737688b85ce23a034a1a8ded2 Mon Sep 17 00:00:00 2001 From: William Vu Date: Tue, 26 Apr 2016 15:26:22 -0500 Subject: [PATCH] Fix typo --- modules/exploits/multi/http/apache_jetspeed_file_upload.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/apache_jetspeed_file_upload.rb b/modules/exploits/multi/http/apache_jetspeed_file_upload.rb index 7f6f27ded4..675af28bee 100644 --- a/modules/exploits/multi/http/apache_jetspeed_file_upload.rb +++ b/modules/exploits/multi/http/apache_jetspeed_file_upload.rb @@ -15,7 +15,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => 'Apache Jetspeed Arbitrary File Upload', 'Description' => %q{ This module exploits the unsecured User Manager REST API and a ZIP file - path traversal in Apache Jetspeed-2, versions 2.3.0 and unknown earlier + path traversal in Apache Jetspeed-2, version 2.3.0 and unknown earlier versions, to upload and execute a shell. Note: this exploit will create, use, and then delete a new admin user.