diff --git a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb index 4b39b1508b..f12c77acc3 100644 --- a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb @@ -42,10 +42,19 @@ class Metasploit3 < Msf::Auxiliary [ OptString.new('TARGETURI', [true, 'The URI path to the web application', '/']), OptString.new('FILE', [true, 'The file to obtain', '/a10data/key/mydomain.tld']), - OptInt.new('DEPTH', [true, 'The max traversal depth to root directory', 10]) + OptInt.new('DEPTH', [true, 'The max traversal depth to root directory', 10]), + OptBool.new('CONFIRM', [true, 'Run the module, even when it will delete files', false]), ], self.class) end + def run + unless datastore['CONFIRM'] + print_error("This module will delete files on vulnerable systems. Please, set CONFIRM in order to run it.") + return + end + + super + end def run_host(ip) peer = "#{ip}:#{rport}"