Skip to content

Commit 1a371b1

Browse files
committed
Update description
1 parent c330d10 commit 1a371b1

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

modules/exploits/multi/http/glassfish_deployer.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,9 @@ def initialize(info={})
2121
This module logs in to an GlassFish Server (Open Source or Commercial) using various
2222
methods (such as authentication bypass, default credentials, or user-supplied login),
2323
and deploys a malicious war file in order to get remote code execution. It has been
24-
tested on Glassfish 2.x, 3.0, 4.0 and Sun Java System Application Server 9.x.
24+
tested on Glassfish 2.x, 3.0, 4.0 and Sun Java System Application Server 9.x. Newer
25+
GlassFish versions do not allow remote access (Secure Admin) by default, but is required
26+
for exploitation.
2527
},
2628
'License' => MSF_LICENSE,
2729
'Author' =>

0 commit comments

Comments
 (0)