diff --git a/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md b/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md index fe98ec0d11..7d678f79e0 100644 --- a/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md +++ b/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md @@ -14,8 +14,9 @@ Tested against 2019.2.3 from Vulhub and 3002 on Ubuntu 20.04.1. ### Setup -Follow the setup guide in -[documentation/modules/exploit/linux/misc/saltstack_salt_unauth_rce.md](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/misc/saltstack_salt_unauth_rce.md#setup). +Follow the [Docker +steps](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/misc/saltstack_salt_unauth_rce.md#using-docker) +for [CVE-2020-11651](https://nvd.nist.gov/vuln/detail/CVE-2020-11651). ## Verification Steps