Skip to content

Commit a35a2c1

Browse files
Update modules/exploits/linux/http/empire_skywalker.rb
formatting issue Co-authored-by: Christophe De La Fuente <[email protected]>
1 parent 13f5d97 commit a35a2c1

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/linux/http/empire_skywalker.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ def initialize(info = {})
4040
info,
4141
'Name' => 'PowerShellEmpire Arbitrary File Upload (Skywalker)',
4242
'Description' => %q{
43-
A vulnerability existed in
44-
the new Empire (maintained by BC Security) prior to commit e73e883 (<v5.9.3) or
45-
the original PowerShellEmpire server prior to commit f030cf62
46-
which would allow an arbitrary file to be written to an
47-
attacker controlled location with the permissions of the Empire server.
43+
A vulnerability existed in the new Empire (maintained by BC Security)
44+
prior to commit e73e883 (<v5.9.3) or the original PowerShellEmpire
45+
server prior to commit f030cf62 which would allow an arbitrary file
46+
to be written to an attacker controlled location with the permissions
47+
of the Empire server.
4848
4949
This exploit will write the payload to /tmp/ directory followed by a
5050
cron.d file to execute the payload.

0 commit comments

Comments
 (0)