This module is only meant to handle GET and PUT, so let's be strict on that
parent
7ae58bfd9d
commit
9e17b09632
|
@ -36,9 +36,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('METHOD', [ true, "HTTP Method",'GET']),
|
||||
OptEnum.new('METHOD', [true, 'HTTP Request Method', 'GET', ['GET', 'POST']]),
|
||||
OptString.new('PATH', [ true, "The path/file to test SQL injection", '/default.aspx']),
|
||||
OptString.new('QUERY', [ false, "HTTP URI Query", '']),
|
||||
OptString.new('QUERY',[ false, "HTTP URI Query", '']),
|
||||
OptString.new('DATA', [ false, "HTTP Body/Data Query", ''])
|
||||
], self.class)
|
||||
|
||||
|
|
Loading…
Reference in New Issue