some bugs for sinn3r
parent
d6f397ab6d
commit
ec35f4b13f
|
@ -48,6 +48,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
Opt::RPORT(443),
|
||||||
|
OptBool.new('SSL', [true, 'Use SSL', true]),
|
||||||
OptString.new('TARGETURI', [true, 'The URI of the vulnerable instance', '/']),
|
OptString.new('TARGETURI', [true, 'The URI of the vulnerable instance', '/']),
|
||||||
OptString.new('USERNAME', [true, 'The username to authenticate with', 'administrator']),
|
OptString.new('USERNAME', [true, 'The username to authenticate with', 'administrator']),
|
||||||
OptString.new('PASSWORD', [true, 'The password to authenticate with', 'admin123'])
|
OptString.new('PASSWORD', [true, 'The password to authenticate with', 'admin123'])
|
||||||
|
@ -63,6 +65,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
fail_with("Server did not respond in an expected way")
|
fail_with("Server did not respond in an expected way")
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if res.code != 200
|
||||||
|
fail_with("Did not get a 200 response, perhaps the server isn't on an SSL port")
|
||||||
|
end
|
||||||
|
|
||||||
token = /name='csrfmiddlewaretoken' value='(.*)'/.match(res.body)
|
token = /name='csrfmiddlewaretoken' value='(.*)'/.match(res.body)
|
||||||
|
|
||||||
token = token[1]
|
token = token[1]
|
||||||
|
|
Loading…
Reference in New Issue