Skip to content

Commit 2260e4b

Browse files
committed
Switch to manual payload selection, because we don't auto-detect
1 parent c08ee69 commit 2260e4b

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

modules/exploits/multi/http/splunk_upload_app_exec.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => '[INCOMPLETE] Splunk 5.0 Custom App Remote Code Execution',
17+
'Name' => 'Splunk 5.0 Custom App Remote Code Execution',
1818
'Description' => %q{
1919
This module exploits a feature of Splunk whereby a custom application can be
2020
uploaded through the web based interface. Through the 'script' search command a
@@ -43,7 +43,6 @@ def initialize(info = {})
4343
'Space' => 1024,
4444
'DisableNops' => true
4545
},
46-
'Platform' => ['unix', 'win', 'linux'],
4746
'Targets' =>
4847
[
4948
[ 'Splunk 5.0.1 / Linux',
@@ -59,7 +58,6 @@ def initialize(info = {})
5958
}
6059
]
6160
],
62-
'DefaultTarget' => 0,
6361
'DisclosureDate' => 'Sep 27 2012'))
6462

6563
register_options(

0 commit comments

Comments
 (0)