From 2b4ace9960318040f3680e91dce4165cb098b5cb Mon Sep 17 00:00:00 2001 From: Christian Mehlmauer Date: Tue, 9 May 2017 09:30:45 +0200 Subject: [PATCH] convert to "screaming snake" --- .../windows/iis/iis_webdav_scstoragepathfromurl.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/windows/iis/iis_webdav_scstoragepathfromurl.rb b/modules/exploits/windows/iis/iis_webdav_scstoragepathfromurl.rb index d25a7b05e2..e3a0624e62 100644 --- a/modules/exploits/windows/iis/iis_webdav_scstoragepathfromurl.rb +++ b/modules/exploits/windows/iis/iis_webdav_scstoragepathfromurl.rb @@ -71,17 +71,17 @@ class MetasploitModule < Msf::Exploit::Remote register_options( [ OptString.new('TARGETURI', [ true, 'Path of IIS 6 web application', '/']), - OptInt.new('MinPathLength', [ true, 'Start of physical path brute force', 3 ]), - OptInt.new('MaxPathLength', [ true, 'End of physical path brute force', 60 ]), + OptInt.new('MINPATHLENGTH', [ true, 'Start of physical path brute force', 3 ]), + OptInt.new('MAXPATHLENGTH', [ true, 'End of physical path brute force', 60 ]), ]) end def min_path_len - datastore['MinPathLength'] + datastore['MINPATHLENGTH'] end def max_path_len - datastore['MaxPathLength'] + datastore['MAXPATHLENGTH'] end def supports_webdav?(headers)