From e286c96dee37b5afbf199fe29f318989f688c555 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ege=20Balc=C4=B1?= <17179401+EgeBalci@users.noreply.github.com> Date: Thu, 7 Sep 2023 17:00:17 +0000 Subject: [PATCH] Update modules/exploits/windows/http/lg_simple_editor_rce.rb Co-authored-by: jheysel-r7 --- modules/exploits/windows/http/lg_simple_editor_rce.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/lg_simple_editor_rce.rb b/modules/exploits/windows/http/lg_simple_editor_rce.rb index 37bf78479125..c22a6f994407 100644 --- a/modules/exploits/windows/http/lg_simple_editor_rce.rb +++ b/modules/exploits/windows/http/lg_simple_editor_rce.rb @@ -18,7 +18,7 @@ def initialize(info = {}) 'Description' => %q{ This Metasploit module exploits broken access control and directory traversal vulnerabilities in LG Simple Editor software for gaining code execution. - The vulnerabilities exists in versions of LG Simple Editor prior to v3.21. + The vulnerabilities exist in versions of LG Simple Editor prior to v3.21. By exploiting this flaw, an attacker can upload and execute a malicious JSP payload with the SYSTEM user permissions. },