File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -40,11 +40,11 @@ def initialize(info = {})
40
40
info ,
41
41
'Name' => 'PowerShellEmpire Arbitrary File Upload (Skywalker)' ,
42
42
'Description' => %q{
43
- A vulnerability existed in
44
- the new Empire (maintained by BC Security) prior to commit e73e883 (<v5.9.3) or
45
- the original PowerShellEmpire server prior to commit f030cf62
46
- which would allow an arbitrary file to be written to an
47
- attacker controlled location with the permissions of the Empire server.
43
+ A vulnerability existed in the new Empire (maintained by BC Security)
44
+ prior to commit e73e883 (<v5.9.3) or the original PowerShellEmpire
45
+ server prior to commit f030cf62 which would allow an arbitrary file
46
+ to be written to an attacker controlled location with the permissions
47
+ of the Empire server.
48
48
49
49
This exploit will write the payload to /tmp/ directory followed by a
50
50
cron.d file to execute the payload.
You can’t perform that action at this time.
0 commit comments