diff --git a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb index 02a5bbea23..781efb5c9e 100644 --- a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb +++ b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a command injection flaw within Oracle\'s VM Server Virtual Server Agent (ovs-agent) service. - By including shell meta characters within the second parameter to the 'urt_test_url' + By including shell meta characters within the second parameter to the 'utl_test_url' XML-RPC methodCall, an attacker can execute arbitrary commands. The service typically runs with root privileges.