Make use of Msf::Exploit::Remote::Tcp

bug/bundler_fix
Jonathan Claudius 2017-04-18 19:17:48 -04:00
parent 03e3065706
commit 9a870a623d
No known key found for this signature in database
GPG Key ID: 4BCDD990313DFA87
1 changed files with 2 additions and 10 deletions

View File

@ -6,13 +6,14 @@
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::SSH
def initialize(info={})
super(update_info(info,
'Name' => "Mercurial Custom hg-ssh Wrapper Remote Code Exec",
'Description' => %q{
This module takes advantage of custom hg-ssh wrapper implementations that don'that
This module takes advantage of custom hg-ssh wrapper implementations that don't
adequately validate parameters passed to the hg binary, allowing users to trigger a
Python Debugger session, which allows arbitrary Python code execution.
},
@ -39,7 +40,6 @@ class MetasploitModule < Msf::Exploit::Remote
register_options(
[
Opt::RHOST(""),
Opt::RPORT(22),
OptString.new('USERNAME', [ true, 'The username for authentication', 'root' ]),
OptString.new('SSH_PRIV_KEY_FILE', [ true, 'The path to private key for ssh auth', '' ]),
@ -54,14 +54,6 @@ class MetasploitModule < Msf::Exploit::Remote
)
end
def rhost
datastore['RHOST']
end
def rport
datastore['RPORT']
end
def username
datastore['USERNAME']
end