diff --git a/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md b/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md index d8e8e35219d7..d11f88aef30f 100644 --- a/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md +++ b/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md @@ -44,8 +44,8 @@ Create a Splunk's docker container with the following command: $ curl -k -u admin:password https://localhost:8089/services/authorization/roles/user-redway -d capabilities=edit_user -X POST ``` -:exclamation: One must log in at least once on the web interface (https://localhost:8000). Otherwise, this module will fail to get the CSRF -token on the `appinstall`. +**One must log in at least once on the web interface (http://localhost:8000). Otherwise, this module will fail to get the CSRF +token on the `appinstall`.** ## Verification Steps Follow [Setup](#setup) and [Scenarios](#scenarios).