This module only handles GET, so that's the only option we'll allow

unstable
sinn3r 2012-02-17 18:20:16 -06:00
parent 9e17b09632
commit ec58b4669e
1 changed files with 1 additions and 1 deletions

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
register_options(
[
OptString.new('METHOD', [true, "HTTP Method","GET"]),
OptEnum.new('METHOD', [true, 'HTTP Method', 'GET', ['GET'] ]),
OptString.new('PATH', [ true, "The path/file to test SQL injection", '/index.asp']),
OptString.new('QUERY', [ false, "HTTP URI Query", '']),
OptString.new('DATA', [ false, "HTTP Body Data", '']),