@@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => "Ajenti 2.1.31 Remote Code Execution",
|
||||
'Name' => 'Ajenti auth username Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a command injection in Ajenti <= 2.1.31.
|
||||
By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.
|
||||
|
||||
Reference in New Issue
Block a user