diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb index d095e0ce50..602524000c 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb @@ -48,11 +48,7 @@ class Metasploit3 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => "/dswsbobje/services/listServices", - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } - + 'method' => 'GET' }, 25) return if not res diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb index 37a9d4e42b..cc3614f4e1 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb @@ -44,11 +44,7 @@ class Metasploit3 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => "/PlatformServices/service/app/logon.object", - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } - + 'method' => 'GET' }, 25) return if not res diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb index d07a68648a..f6340d18f7 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb @@ -50,11 +50,7 @@ class Metasploit3 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']) + "/services/listServices", - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } - + 'method' => 'GET' }, 25) return if not res diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb b/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb index c5e34fa11e..c69bdf58dd 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb @@ -49,11 +49,7 @@ class Metasploit3 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']) + "/services/listServices", - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } - + 'method' => 'GET' }, 25) return if not res or res.code != 200 diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb index 77071e052f..0e27e4a4c6 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb @@ -47,8 +47,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => {'User-Agent' => datastore['UserAgent']} + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb index 5c69b3554c..8b09e14a0a 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb @@ -52,11 +52,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb index b13e062236..8e8fec1e8c 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb @@ -50,12 +50,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } - + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb index f10883a279..02ab323839 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb @@ -50,11 +50,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb index a826dd39e0..45e07bef1b 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb @@ -50,11 +50,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb index ca733c40e4..4be9c8d3a3 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb @@ -41,8 +41,8 @@ class Metasploit4 < Msf::Auxiliary Opt::RPORT(50013), OptString.new('URI', [false, 'Path to the SAP Management Console ', '/']), OptString.new('RFILE', [ true, 'The name of the file to download ', 'sapstart.log']), - OptString.new('FILETYPE', [true, 'Specify LOGFILE or TRACEFILE', 'TRACEFILE']), - OptBool.new('GETALL', [ false, 'Download all available files (WARNING: may take long!)', false]), + OptEnum.new('FILETYPE', [true, 'Specify LOGFILE or TRACEFILE', 'TRACEFILE', ['TRACEFILE','LOGFILE']]), + OptBool.new('GETALL', [ false, 'Download all available files (WARNING: may take a long time!)', false]) ], self.class) register_autofilter_ports([ 50013 ]) deregister_options('RHOST') diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb index 817c93bc26..c09b0f87b9 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb @@ -51,11 +51,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb index b94bbdffd7..261da9b14a 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb @@ -39,7 +39,7 @@ class Metasploit4 < Msf::Auxiliary [ Opt::RPORT(50013), OptString.new('URI', [false, 'Path to the SAP Management Console ', '/']), - OptString.new('FILETYPE', [true, 'Specify LOGFILE or TRACEFILE', 'TRACEFILE']), + OptEnum.new('FILETYPE', [true, 'Specify LOGFILE or TRACEFILE', 'TRACEFILE', ['TRACEFILE','LOGFILE']]) ], self.class) register_autofilter_ports([ 50013 ]) deregister_options('RHOST') @@ -52,11 +52,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => - { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb index 6b81f6c5fc..1a3655af32 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb @@ -50,10 +50,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb index 37d33dc83c..11a8367c7f 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb @@ -50,10 +50,7 @@ class Metasploit4 < Msf::Auxiliary def run_host(ip) res = send_request_cgi({ 'uri' => normalize_uri(datastore['URI']), - 'method' => 'GET', - 'headers' => { - 'User-Agent' => datastore['UserAgent'] - } + 'method' => 'GET' }, 25) if not res