Skip to content

Commit fbc3709

Browse files
committed
Change the title and regex a bit
1 parent 30846f4 commit fbc3709

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/windows/scada/indusoft_webstudio_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
1616

1717
def initialize(info = {})
1818
super(update_info(info,
19-
'Name' => 'InduSoft Web Studio Remote Code Execution',
19+
'Name' => 'InduSoft Web Studio Arbitrary Upload Remote Code Execution',
2020
'Description' => %q{
2121
This module exploits a lack of authentication and authorization on the InduSoft
2222
Web Studio Remote Agent, that allows a remote attacker to write arbitrary files to
@@ -65,7 +65,7 @@ def check
6565
app_info = sock.get_once
6666
disconnect
6767

68-
if app_info =~ /InduSoft Web Studio v6.1/
68+
if app_info =~ /InduSoft Web Studio v6\.1/
6969
return Exploit::CheckCode::Vulnerable
7070
elsif app_info =~ /InduSoft Web Studio/
7171
return Exploit::CheckCode::Detected

0 commit comments

Comments
 (0)