mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Update name to mention DC; correct servlet name
This commit is contained in:
parent
bcdea05b51
commit
473341610c
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "ManageEngine Password Manager MetadataServlet.dat SQL Injection",
|
'Name' => "ManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
|
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
|
||||||
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and
|
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and
|
||||||
|
Loading…
Reference in New Issue
Block a user