diff --git a/documentation/modules/exploit/linux/ssh/microfocus_obr_shrboadmin.md b/documentation/modules/exploit/linux/ssh/microfocus_obr_shrboadmin.md index 30c7e9a0c3..39ca311721 100644 --- a/documentation/modules/exploit/linux/ssh/microfocus_obr_shrboadmin.md +++ b/documentation/modules/exploit/linux/ssh/microfocus_obr_shrboadmin.md @@ -1,7 +1,7 @@ ## Vulnerable Application This module abuses a known default password on Micro Focus Operations Bridge Reporter. -The 'shrboadmin' user, installed by default by the product has the password of 'scpuser', and allows an attacker to login to server via SSH. +The 'shrboadmin' user, installed by default by the product has the password of 'shrboadmin', and allows an attacker to login to server via SSH. This module has been tested with Micro Focus Operations Bridge Manager 10.40. Earlier versions are most likely affected too, but have not been tested with this module. ## Scenarios diff --git a/modules/exploits/linux/ssh/microfocus_obr_shrboadmin.rb b/modules/exploits/linux/ssh/microfocus_obr_shrboadmin.rb index 6fc0afd968..ad2c244f15 100644 --- a/modules/exploits/linux/ssh/microfocus_obr_shrboadmin.rb +++ b/modules/exploits/linux/ssh/microfocus_obr_shrboadmin.rb @@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => 'Micro Focus Operations Bridge Reporter shrboadmin default password', 'Description' => %q{ This module abuses a known default password on Micro Focus Operations Bridge Reporter. - The 'shrboadmin' user, installed by default by the product has the password of 'scpuser', + The 'shrboadmin' user, installed by default by the product has the password of 'shrboadmin', and allows an attacker to login to server via SSH. This module has been tested with Micro Focus Operations Bridge Manager 10.40. Earlier versions are most likely affected too.