File tree Expand file tree Collapse file tree 2 files changed +3
-4
lines changed
documentation/modules/exploit/multi/http
modules/exploits/multi/http Expand file tree Collapse file tree 2 files changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -97,7 +97,7 @@ Exploit target:
97
97
98
98
Id Name
99
99
-- ----
100
- 0 Automatic
100
+ 0 PHP In-Memory
101
101
102
102
103
103
@@ -107,8 +107,6 @@ msf6 exploit(multi/http/wp_hash_form_rce) > set rhosts 127.0.0.1
107
107
rhosts => 127.0.0.1
108
108
msf6 exploit(multi/http/wp_hash_form_rce) > set rport 8080
109
109
rport => 8080
110
- msf6 exploit(multi/http/wp_hash_form_rce) > set target 1
111
- target => 1
112
110
msf6 exploit(multi/http/wp_hash_form_rce) > exploit
113
111
114
112
[*] Started reverse TCP handler on 192.168.1.36:4444
@@ -165,7 +163,7 @@ Exploit target:
165
163
166
164
Id Name
167
165
-- ----
168
- 2 Unix/Linux Command Shell
166
+ 1 Unix/Linux Command Shell
169
167
170
168
171
169
Original file line number Diff line number Diff line change @@ -59,6 +59,7 @@ def initialize(info = {})
59
59
}
60
60
]
61
61
] ,
62
+ 'DefaultTarget' => 0 ,
62
63
'Privileged' => false ,
63
64
'DisclosureDate' => '2024-05-23' ,
64
65
'Notes' => {
You can’t perform that action at this time.
0 commit comments