Make use of Msf::Exploit::Remote::Tcp
parent
03e3065706
commit
9a870a623d
|
@ -6,13 +6,14 @@
|
|||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Exploit::Remote::Tcp
|
||||
include Msf::Exploit::Remote::SSH
|
||||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Mercurial Custom hg-ssh Wrapper Remote Code Exec",
|
||||
'Description' => %q{
|
||||
This module takes advantage of custom hg-ssh wrapper implementations that don'that
|
||||
This module takes advantage of custom hg-ssh wrapper implementations that don't
|
||||
adequately validate parameters passed to the hg binary, allowing users to trigger a
|
||||
Python Debugger session, which allows arbitrary Python code execution.
|
||||
},
|
||||
|
@ -39,7 +40,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
register_options(
|
||||
[
|
||||
Opt::RHOST(""),
|
||||
Opt::RPORT(22),
|
||||
OptString.new('USERNAME', [ true, 'The username for authentication', 'root' ]),
|
||||
OptString.new('SSH_PRIV_KEY_FILE', [ true, 'The path to private key for ssh auth', '' ]),
|
||||
|
@ -54,14 +54,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
)
|
||||
end
|
||||
|
||||
def rhost
|
||||
datastore['RHOST']
|
||||
end
|
||||
|
||||
def rport
|
||||
datastore['RPORT']
|
||||
end
|
||||
|
||||
def username
|
||||
datastore['USERNAME']
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue