Add POST to method

unstable
sinn3r 2012-02-17 22:36:33 -06:00
parent bb5e4a1600
commit ebd5438984
1 changed files with 3 additions and 4 deletions

View File

@ -25,11 +25,10 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'HTTP Blind SQL Injection GET QUERY Scanner', 'Name' => 'HTTP Blind SQL Injection QUERY Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies the existence of Blind SQL injection issues This module identifies the existence of Blind SQL injection issues
in GET Query parameters values. in GET/POST Query parameters values.
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
@ -37,7 +36,7 @@ class Metasploit3 < Msf::Auxiliary
register_options( register_options(
[ [
OptEnum.new('METHOD', [true, 'HTTP Method', 'GET', ['GET'] ]), OptEnum.new('METHOD', [true, 'HTTP Method', 'GET', ['GET', 'POST'] ]),
OptString.new('PATH', [ true, "The path/file to test SQL injection", '/index.asp']), OptString.new('PATH', [ true, "The path/file to test SQL injection", '/index.asp']),
OptString.new('QUERY', [ false, "HTTP URI Query", '']), OptString.new('QUERY', [ false, "HTTP URI Query", '']),
OptString.new('DATA', [ false, "HTTP Body Data", '']), OptString.new('DATA', [ false, "HTTP Body Data", '']),