From b0d32a308aedc798409eb84510efab09efce8a3c Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Sat, 19 Oct 2013 00:52:22 -0500 Subject: [PATCH] Update version information --- modules/exploits/windows/http/hp_imc_bims_upload.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/http/hp_imc_bims_upload.rb b/modules/exploits/windows/http/hp_imc_bims_upload.rb index e19aa3e4c2..31e2127c84 100644 --- a/modules/exploits/windows/http/hp_imc_bims_upload.rb +++ b/modules/exploits/windows/http/hp_imc_bims_upload.rb @@ -17,10 +17,10 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'HP Intelligent Management Center BIMS UploadServlet Directory Traversal', 'Description' => %q{ - This module exploits a directory traversal vulnerability on the version 5.1 of the BIMS + This module exploits a directory traversal vulnerability on the version 5.2 of the BIMS component from the HP Intelligent Management Center. The vulnerability exists in the UploadServlet, allowing the user to download and upload arbitrary files. This module has - been tested successfully on HP Intelligent Management Center with BIMS 5.1 E0202 on Windows + been tested successfully on HP Intelligent Management Center with BIMS 5.2 E0401 on Windows 2003 SP2. }, 'Author' => @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Arch' => ARCH_JAVA, 'Targets' => [ - [ 'HP Intelligent Management Center 5.1 E0202 / BIMS 5.1 E0202 / Windows', { } ] + [ 'HP Intelligent Management Center 5.2 E0401 / BIMS 5.2 E0401 / Windows', { } ] ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Oct 08 2013'))