Skip to content

Commit 58091b9

Browse files
committed
Land rapid7#3708, @pedrib fix for manage_engine_dc_pmp_sqli
2 parents d8c1576 + a8d03ae commit 58091b9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/multi/http/manage_engine_dc_pmp_sqli.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info={})
1717
super(update_info(info,
18-
'Name' => "ManageEngine Password Manager MetadataServlet.dat SQL Injection",
18+
'Name' => "ManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection",
1919
'Description' => %q{
2020
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
2121
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and
@@ -216,7 +216,7 @@ def db_paths
216216
paths = desktop_central_db_paths
217217

218218
if paths.empty?
219-
paths = check_password_manager_pro
219+
paths = password_manager_paths
220220
end
221221

222222
paths

0 commit comments

Comments
 (0)