Skip to content

Commit 3a66a07

Browse files
committed
Proposed re-wording of description
[See rapid7#889]
1 parent 24980e7 commit 3a66a07

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/exploits/unix/webapp/projectpier_upload_exec.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,9 @@ def initialize(info={})
2020
This module exploits a vulnerability found in Project Pier. The application's
2121
uploading tool does not require any authentication, which allows a malicious user
2222
to upload an arbitrary file onto the web server, and then cause remote code
23-
execution by simply requesting it. Please note this module only works best against
24-
an Apache server due to the way it handle an extension name.
23+
execution by simply requesting it. This module is known to work against Apache
24+
servers due to the way it handles an extension name, but the vulnerability may
25+
not be exploitable on others.
2526
},
2627
'License' => MSF_LICENSE,
2728
'Author' =>

0 commit comments

Comments
 (0)