1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Update name to mention DC; correct servlet name

This commit is contained in:
Pedro Ribeiro 2014-08-26 12:39:48 +01:00
parent bcdea05b51
commit 473341610c

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "ManageEngine Password Manager MetadataServlet.dat SQL Injection", 'Name' => "ManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection",
'Description' => %q{ 'Description' => %q{
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet, This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and