diff --git a/modules/exploits/multi/misc/consul_rexec_exec.rb b/modules/exploits/multi/misc/consul_rexec_exec.rb index 8a2404fe98..c8ca5e1e8b 100644 --- a/modules/exploits/multi/misc/consul_rexec_exec.rb +++ b/modules/exploits/multi/misc/consul_rexec_exec.rb @@ -31,10 +31,9 @@ class MetasploitModule < Msf::Exploit::Remote 'Platform' => 'linux', 'Targets' => [ [ 'Linux', {} ] ], 'Payload' => {}, - 'CmdStagerFlavor' => [ 'bourne' ], + 'CmdStagerFlavor' => [ 'bourne', 'echo', 'printf', 'wget', 'curl' ], 'Privileged' => false, 'DefaultTarget' => 0)) - deregister_options('SRVHOST', 'SRVPORT', 'SSLCert', 'URIPATH') register_options( [ OptString.new('TARGETURI', [true, 'The base path', '/']),