fixed typo, thx rmkml
git-svn-id: file:///home/svn/framework3/trunk@10803 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
c03da4fedf
commit
672fc87055
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits a command injection flaw within Oracle\'s VM Server
|
This module exploits a command injection flaw within Oracle\'s VM Server
|
||||||
Virtual Server Agent (ovs-agent) service.
|
Virtual Server Agent (ovs-agent) service.
|
||||||
|
|
||||||
By including shell meta characters within the second parameter to the 'urt_test_url'
|
By including shell meta characters within the second parameter to the 'utl_test_url'
|
||||||
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
|
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
|
||||||
typically runs with root privileges.
|
typically runs with root privileges.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue