Skip to content

Commit f867502

Browse files
committed
Update documentation again
1 parent 3dfdaea commit f867502

File tree

1 file changed

+1
-5
lines changed

1 file changed

+1
-5
lines changed

documentation/modules/exploit/multi/http/spip_bigup_unauth_rce.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,16 +41,12 @@ To replicate a vulnerable environment for testing, follow these steps:
4141
```bash
4242
docker run --name casse-spip -p 8000:80 \
4343
-e SPIP_DB_SERVER=sqlite3 \
44-
-e SPIP_SITE_ADDRESS=http://127.0.0.1 \
44+
-e SPIP_SITE_ADDRESS=http://localhost \
4545
-d ipeos/spip:4.3.1
4646
```
4747

4848
2. Go to `http://localhost:8000` to access the SPIP application.
4949

50-
It is recommended to use the Docker installation because the non-Docker version automatically
51-
retrieves the latest plugin updates, making the exploit ineffective.
52-
The Docker version ensures a vulnerable environment.
53-
5450
## Verification Steps
5551

5652
1. Set up a SPIP instance using the commands provided above.

0 commit comments

Comments
 (0)