diff --git a/modules/exploits/unix/webapp/ajenti_login_rce.rb b/modules/exploits/unix/webapp/ajenti_login_rce.rb index af30b1589d..39ce163354 100644 --- a/modules/exploits/unix/webapp/ajenti_login_rce.rb +++ b/modules/exploits/unix/webapp/ajenti_login_rce.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => "Ajenti 2.1.31 Remote Code Execution", + 'Name' => 'Ajenti auth username Command Execution', 'Description' => %q{ This module exploits a command injection in Ajenti <= 2.1.31. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.