diff --git a/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb b/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb index 5458c5182..165554454 100644 --- a/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb +++ b/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb @@ -7,7 +7,7 @@ class Vtiger_crm_upload_exploit < BeEF::Command def initialize super({ 'Name' => 'VTiger CRM Upload Exploit', - 'Description' => 'This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM vtiger 5.0.4', + 'Description' => 'This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM vtiger 5.0.4
Don\'t forget to start a listener on your PC, for example: nc -l 8888', 'Category' => 'Network', 'Author' => ['wade', 'bm', 'pipes', 'xntrik'], 'Data' =>