Fix #6694, typo fix

bug/bundler_fix
William Vu 2016-04-26 15:26:33 -05:00
commit 63c6a6dbe2
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
1 changed files with 1 additions and 1 deletions

View File

@ -15,7 +15,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Name' => 'Apache Jetspeed Arbitrary File Upload', 'Name' => 'Apache Jetspeed Arbitrary File Upload',
'Description' => %q{ 'Description' => %q{
This module exploits the unsecured User Manager REST API and a ZIP file This module exploits the unsecured User Manager REST API and a ZIP file
path traversal in Apache Jetspeed-2, versions 2.3.0 and unknown earlier path traversal in Apache Jetspeed-2, version 2.3.0 and unknown earlier
versions, to upload and execute a shell. versions, to upload and execute a shell.
Note: this exploit will create, use, and then delete a new admin user. Note: this exploit will create, use, and then delete a new admin user.