Closed h00die closed 2 years ago
@h00die can i contribute to this?
@Arpit-mohankar Feel free to submit a PR to fix this, and then just make sure you link to this issue with "Fixes # " and then add after the # the number of the issue, which in this case would be 16674.
@gwillcox-r7 @bcoles plz help me to pass Metasploit Automation - Sanity Test Execution
@Arpit-mohankar Think that may be something on our side, please follow the instructions in the comments and open a new PR as per directions and if it occurs again I'll look into it further.
@gwillcox-r7 I would like to contribute to this issue. Is this issue still open?
ticket is still open, and https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/manageengine_adshacluster_rce.rb#L14 is still there. have at it @JustAnda7
Fix "Manage Engine" to be "ManageEngine" in
exploit/windows/http/manageengine_adshacluster_rce
to be consistent with literally every other module.I would update the link as well to
https://security.szurek.pl/en/manage-engine-exchange-reporter-plus-unauthenticated-rce/