Update documentation/modules/exploit/linux/http/mailcleaner_exec.md
Co-Authored-By: mmetince <mmetince@users.noreply.github.com>GSoC/Meterpreter_Web_Console
parent
9481ad04f2
commit
9a43507416
|
@ -1,4 +1,4 @@
|
|||
## Vulnerable Application
|
||||
## Description
|
||||
|
||||
This module exploits the command injection vulnerability of MailCleaner Community Edition product. An authenticated user can execute an operating system command under the context of the web server user which is root.
|
||||
|
||||
|
@ -82,4 +82,4 @@ msf5 exploit(linux/http/mailcleaner_exec) > run
|
|||
|
||||
id
|
||||
uid=0(root) gid=1003(mailcleaner) groups=1003(mailcleaner)
|
||||
```
|
||||
```
|
||||
|
|
Loading…
Reference in New Issue