diff --git a/modules/auxiliary/scanner/http/error_sql_injection.rb b/modules/auxiliary/scanner/http/error_sql_injection.rb index 7a0b9fd4ea..371a3a217b 100644 --- a/modules/auxiliary/scanner/http/error_sql_injection.rb +++ b/modules/auxiliary/scanner/http/error_sql_injection.rb @@ -36,9 +36,9 @@ class Metasploit3 < Msf::Auxiliary register_options( [ - OptString.new('METHOD', [ true, "HTTP Method",'GET']), + OptEnum.new('METHOD', [true, 'HTTP Request Method', 'GET', ['GET', 'POST']]), OptString.new('PATH', [ true, "The path/file to test SQL injection", '/default.aspx']), - OptString.new('QUERY', [ false, "HTTP URI Query", '']), + OptString.new('QUERY',[ false, "HTTP URI Query", '']), OptString.new('DATA', [ false, "HTTP Body/Data Query", '']) ], self.class)