From 8fbc577b73c2f9128f1dfd1fbc6d685b1ca69c75 Mon Sep 17 00:00:00 2001 From: sfewer-r7 Date: Tue, 3 Feb 2026 10:30:52 +0000 Subject: [PATCH] fix typos --- modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb b/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb index c31faeee20..5db37f7887 100644 --- a/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb +++ b/modules/exploits/multi/http/solarwinds_webhelpdesk_rce.rb @@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => 'SolarWinds Web Help Desk unauthenticated RCE', 'Description' => %q{ This module exploits an access control bypass vulnerability (CVE-2025-40536) and an unsafe deserialization - vulnerability (CVE-2025-40551) to achieve unauthenticvate RCE againt a vulnerable SolarWinds Web Help Desk + vulnerability (CVE-2025-40551) to achieve unauthenticated RCE against a vulnerable SolarWinds Web Help Desk server. }, 'License' => MSF_LICENSE, @@ -105,7 +105,7 @@ class MetasploitModule < Msf::Exploit::Remote case target['Platform'] when 'win' - fail_with(Failure::BadConfig, "Remote target is runnign on #{session_ctx[:platform]} but Metasploit target platform is #{target['Platform']}") unless session_ctx[:platform] == :windows + fail_with(Failure::BadConfig, "Remote target is running on #{session_ctx[:platform]} but Metasploit target platform is #{target['Platform']}") unless session_ctx[:platform] == :windows # TODO: when 'linux', 'unix' end