From 9c1576b20e856ed81543fed36563de4feab5c212 Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Tue, 7 Dec 2010 17:46:24 +0000 Subject: [PATCH] update the title git-svn-id: file:///home/svn/framework3/trunk@11246 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/unix/webapp/trixbox_langchoice.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/trixbox_langchoice.rb b/modules/exploits/unix/webapp/trixbox_langchoice.rb index 47c9501b9d..c29fe036a3 100644 --- a/modules/exploits/unix/webapp/trixbox_langchoice.rb +++ b/modules/exploits/unix/webapp/trixbox_langchoice.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Trixbox langChoice PHP injection', + 'Name' => 'Trixbox langChoice PHP Local File Inclusion', 'Description' => %q{ This module injects php into the trixbox session file and then, in a second call, evaluates that code by manipulating the langChoice parameter as described in OSVDB-50421.