diff --git a/modules/exploits/windows/http/hp_imc_bims_upload.rb b/modules/exploits/windows/http/hp_imc_bims_upload.rb index e19aa3e4c2..31e2127c84 100644 --- a/modules/exploits/windows/http/hp_imc_bims_upload.rb +++ b/modules/exploits/windows/http/hp_imc_bims_upload.rb @@ -17,10 +17,10 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'HP Intelligent Management Center BIMS UploadServlet Directory Traversal', 'Description' => %q{ - This module exploits a directory traversal vulnerability on the version 5.1 of the BIMS + This module exploits a directory traversal vulnerability on the version 5.2 of the BIMS component from the HP Intelligent Management Center. The vulnerability exists in the UploadServlet, allowing the user to download and upload arbitrary files. This module has - been tested successfully on HP Intelligent Management Center with BIMS 5.1 E0202 on Windows + been tested successfully on HP Intelligent Management Center with BIMS 5.2 E0401 on Windows 2003 SP2. }, 'Author' => @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Arch' => ARCH_JAVA, 'Targets' => [ - [ 'HP Intelligent Management Center 5.1 E0202 / BIMS 5.1 E0202 / Windows', { } ] + [ 'HP Intelligent Management Center 5.2 E0401 / BIMS 5.2 E0401 / Windows', { } ] ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Oct 08 2013'))