From eb5feb6f4f8dd5c176beb4cc6dccd61c0d26213a Mon Sep 17 00:00:00 2001 From: Haoxi Tan Date: Thu, 9 Jan 2020 08:38:29 +1000 Subject: [PATCH] updated module description --- modules/exploits/vtiger_crm_upload_exploit/config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/vtiger_crm_upload_exploit/config.yaml b/modules/exploits/vtiger_crm_upload_exploit/config.yaml index ee305a02a..cabc6f342 100644 --- a/modules/exploits/vtiger_crm_upload_exploit/config.yaml +++ b/modules/exploits/vtiger_crm_upload_exploit/config.yaml @@ -9,7 +9,7 @@ beef: enable: true category: "Exploits" name: "VTiger CRM Upload Exploit" - description: "This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM vtiger 5.0.4
The default PHP requires a listener, so don't forget to start one, for example: nc -l 8888." + description: "This module demonstrates chained exploitation. It will upload and execute a reverse shell. The vulnerability is exploited in the CRM vtiger 5.0.4
The default PHP requires a listener, so don't forget to start one, for example: nc -l 8888." authors: ["wade", "bm", "pipes", "xntrik", "yorikv"] target: working: ["ALL"]