some bugs for sinn3r
parent
d6f397ab6d
commit
ec35f4b13f
|
@ -48,6 +48,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(443),
|
||||
OptBool.new('SSL', [true, 'Use SSL', true]),
|
||||
OptString.new('TARGETURI', [true, 'The URI of the vulnerable instance', '/']),
|
||||
OptString.new('USERNAME', [true, 'The username to authenticate with', 'administrator']),
|
||||
OptString.new('PASSWORD', [true, 'The password to authenticate with', 'admin123'])
|
||||
|
@ -63,6 +65,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
fail_with("Server did not respond in an expected way")
|
||||
end
|
||||
|
||||
if res.code != 200
|
||||
fail_with("Did not get a 200 response, perhaps the server isn't on an SSL port")
|
||||
end
|
||||
|
||||
token = /name='csrfmiddlewaretoken' value='(.*)'/.match(res.body)
|
||||
|
||||
token = token[1]
|
||||
|
|
Loading…
Reference in New Issue