Skip to content

Commit e4c55f9

Browse files
committed
Fix module desc
1 parent 9f19d2c commit e4c55f9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/multi/http/struts_dmi_rest_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a remote command execution vulnerability in Apache Struts
1919
version between 2.3.20 and 2.3.28 (except 2.3.20.2 and 2.3.24.2). Remote Code
20-
Execution can be performed via method: prefix when Dynamic Method Invocation
21-
is enabled.
20+
Execution can be performed when using REST Plugin with ! operator when
21+
Dynamic Method Invocation is enabled.
2222
},
2323
'Author' => [
2424
'Nixawk' # original metasploit module

0 commit comments

Comments
 (0)