Add POST to method

unstable
sinn3r 2012-02-17 22:36:33 -06:00
parent bb5e4a1600
commit ebd5438984
1 changed files with 3 additions and 4 deletions

View File

@ -25,11 +25,10 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'HTTP Blind SQL Injection GET QUERY Scanner',
'Name' => 'HTTP Blind SQL Injection QUERY Scanner',
'Description' => %q{
This module identifies the existence of Blind SQL injection issues
in GET Query parameters values.
in GET/POST Query parameters values.
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
@ -37,7 +36,7 @@ class Metasploit3 < Msf::Auxiliary
register_options(
[
OptEnum.new('METHOD', [true, 'HTTP Method', 'GET', ['GET'] ]),
OptEnum.new('METHOD', [true, 'HTTP Method', 'GET', ['GET', 'POST'] ]),
OptString.new('PATH', [ true, "The path/file to test SQL injection", '/index.asp']),
OptString.new('QUERY', [ false, "HTTP URI Query", '']),
OptString.new('DATA', [ false, "HTTP Body Data", '']),