parent
6feae9524b
commit
94b4bc24bd
|
@ -17,8 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a command injection vulnerability on HP Client Automation, distributed
|
This module exploits a command injection vulnerability on HP Client Automation, distributed
|
||||||
actually as Persistent Systems Client Automation. The vulnerability exists in the Notify
|
actually as Persistent Systems Client Automation. The vulnerability exists in the Notify
|
||||||
Daemon (radexecd.exe), which doesn't authenticate execution requests by default neither.
|
Daemon (radexecd.exe), which doesn't authenticate execution requests by default.
|
||||||
This module has been tested successfully on HP Client Automation 9.00 over Windows 2003 SP2
|
|
||||||
|
This module has been tested successfully on HP Client Automation 9.00 on Windows 2003 SP2
|
||||||
and CentOS 5.
|
and CentOS 5.
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue