From 1ac0e2dc668a5d7b7a678dc052d0d0a3465122d4 Mon Sep 17 00:00:00 2001 From: Heyder Andrade Date: Mon, 23 Oct 2023 11:31:19 +0200 Subject: [PATCH] Update splunk_privilege_escalation_cve_2023_32707.md --- .../multi/http/splunk_privilege_escalation_cve_2023_32707.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md b/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md index d8e8e35219d7..d11f88aef30f 100644 --- a/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md +++ b/documentation/modules/exploit/multi/http/splunk_privilege_escalation_cve_2023_32707.md @@ -44,8 +44,8 @@ Create a Splunk's docker container with the following command: $ curl -k -u admin:password https://localhost:8089/services/authorization/roles/user-redway -d capabilities=edit_user -X POST ``` -:exclamation: One must log in at least once on the web interface (https://localhost:8000). Otherwise, this module will fail to get the CSRF -token on the `appinstall`. +**One must log in at least once on the web interface (http://localhost:8000). Otherwise, this module will fail to get the CSRF +token on the `appinstall`.** ## Verification Steps Follow [Setup](#setup) and [Scenarios](#scenarios).