We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9f19d2c commit e4c55f9Copy full SHA for e4c55f9
modules/exploits/multi/http/struts_dmi_rest_exec.rb
@@ -17,8 +17,8 @@ def initialize(info = {})
17
'Description' => %q{
18
This module exploits a remote command execution vulnerability in Apache Struts
19
version between 2.3.20 and 2.3.28 (except 2.3.20.2 and 2.3.24.2). Remote Code
20
- Execution can be performed via method: prefix when Dynamic Method Invocation
21
- is enabled.
+ Execution can be performed when using REST Plugin with ! operator when
+ Dynamic Method Invocation is enabled.
22
},
23
'Author' => [
24
'Nixawk' # original metasploit module
0 commit comments