diff --git a/documentation/modules/exploit/multi/http/spip_connect_exec.md b/documentation/modules/exploit/multi/http/spip_connect_exec.md index a10c5beac4e1..d5da9a26c68e 100644 --- a/documentation/modules/exploit/multi/http/spip_connect_exec.md +++ b/documentation/modules/exploit/multi/http/spip_connect_exec.md @@ -8,9 +8,6 @@ Vulnerable versions are < 2.0.21, < 2.1.16, and < 3.0.3. This module is compatible with both Unix/Linux and Windows platforms, and has been successfully tested on SPIP 2.0.11 and SPIP 2.0.20 on Apache running on Ubuntu, Fedora, and Windows Server. -The module's `check` method attempts to obtain the SPIP version via a simple HTTP -GET request to the `/spip.php` page and fingerprints it either via the `generator` meta tag or the `Composed-By` header. - ## Setup On Ubuntu 20.04, download a vulnerable instance of SPIP: