Update documentation/modules/exploit/linux/http/mailcleaner_exec.md

Co-Authored-By: mmetince <mmetince@users.noreply.github.com>
GSoC/Meterpreter_Web_Console
@shellfail 2018-12-22 23:16:43 +03:00 committed by GitHub
parent 9481ad04f2
commit 9a43507416
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -1,4 +1,4 @@
## Vulnerable Application
## Description
This module exploits the command injection vulnerability of MailCleaner Community Edition product. An authenticated user can execute an operating system command under the context of the web server user which is root.
@ -82,4 +82,4 @@ msf5 exploit(linux/http/mailcleaner_exec) > run
id
uid=0(root) gid=1003(mailcleaner) groups=1003(mailcleaner)
```
```