# Optional stub to be replaced with the exploit payload.
#
# Default stub is 'WEB_PAYLOAD_STUB'.
#
attr_accessor:web_payload_stub
# Creates an instance of a Telnet exploit module.
#
definitialize(info={})
super
register_options([
OptString.new('PATH',[true,'The path to the vulnerable script.','/']),
OptString.new('GET',[false,"GET parameters. ('foo=bar&vuln=#{WEB_PAYLOAD_STUB}', #{WEB_PAYLOAD_STUB} will be substituted with the payload.)",""]),
OptString.new('POST',[false,"POST parameters. ('foo=bar&vuln=#{WEB_PAYLOAD_STUB}', #{WEB_PAYLOAD_STUB} will be substituted with the payload.)",""]),
OptString.new('COOKIES',[false,"Cookies to be sent with the request. ('foo=bar;vuln=#{WEB_PAYLOAD_STUB}', #{WEB_PAYLOAD_STUB} will be substituted with the payload.)",""]),
OptString.new('HEADERS',[false,"Headers to be sent with the request. ('User-Agent=bar&vuln=#{WEB_PAYLOAD_STUB}', #{WEB_PAYLOAD_STUB} will be substituted with the payload.)",""]),