Skip to content

Commit d16189a

Browse files
wvumsjenkins-r7
authored andcommitted
Land rapid7#10677, Pimcore and Dolibarr module renames
1 parent 785cf9e commit d16189a

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

modules/auxiliary/gather/dolibarr_list_creds_sqli.rb renamed to modules/auxiliary/gather/dolibarr_creds_sqli.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,11 @@ class MetasploitModule < Msf::Auxiliary
88

99
def initialize(info = {})
1010
super(update_info(info,
11-
'Name' => 'Dolibarr List Creds',
11+
'Name' => 'Dolibarr Gather Credentials via SQL Injection',
1212
'Description' => %q{
13-
This module enables an authenticated user to collect the usernames and encrypted passwords of other users in the Dolibarr ERP/CRM via SQL injection.
13+
This module enables an authenticated user to collect the usernames and
14+
encrypted passwords of other users in the Dolibarr ERP/CRM via SQL
15+
injection.
1416
},
1517
'Author' => [
1618
'Issam Rabhi', # PoC

modules/auxiliary/gather/pimcore_creds_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
88

99
def initialize(info = {})
1010
super(update_info(info,
11-
'Name' => 'Pimcore List Credentials',
11+
'Name' => 'Pimcore Gather Credentials via SQL Injection',
1212
'Description' => %q{
1313
This module extracts the usernames and hashed passwords of all users of
1414
the Pimcore web service by exploiting a SQL injection vulnerability in

0 commit comments

Comments
 (0)