diff --git a/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb b/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb index c31faeee20..5db37f7887 100644 --- a/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb +++ b/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb @@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => 'SolarWinds Web Help Desk unauthenticated RCE', 'Description' => %q{ This module exploits an access control bypass vulnerability (CVE-2025-40536) and an unsafe deserialization - vulnerability (CVE-2025-40551) to achieve unauthenticvate RCE againt a vulnerable SolarWinds Web Help Desk + vulnerability (CVE-2025-40551) to achieve unauthenticated RCE against a vulnerable SolarWinds Web Help Desk server. }, 'License' => MSF_LICENSE, @@ -105,7 +105,7 @@ class MetasploitModule < Msf::Exploit::Remote case target['Platform'] when 'win' - fail_with(Failure::BadConfig, "Remote target is runnign on #{session_ctx[:platform]} but Metasploit target platform is #{target['Platform']}") unless session_ctx[:platform] == :windows + fail_with(Failure::BadConfig, "Remote target is running on #{session_ctx[:platform]} but Metasploit target platform is #{target['Platform']}") unless session_ctx[:platform] == :windows # TODO: when 'linux', 'unix' end