From 9b9d3013a40698890d473360ac94de945e76200d Mon Sep 17 00:00:00 2001 From: Onur ER Date: Tue, 29 Oct 2019 22:18:36 +0300 Subject: [PATCH] Module name changed. Co-Authored-By: bcoles --- modules/exploits/unix/webapp/ajenti_login_rce.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/ajenti_login_rce.rb b/modules/exploits/unix/webapp/ajenti_login_rce.rb index af30b1589d..39ce163354 100644 --- a/modules/exploits/unix/webapp/ajenti_login_rce.rb +++ b/modules/exploits/unix/webapp/ajenti_login_rce.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => "Ajenti 2.1.31 Remote Code Execution", + 'Name' => 'Ajenti auth username Command Execution', 'Description' => %q{ This module exploits a command injection in Ajenti <= 2.1.31. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.