We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 96feb8d commit 84aa9ceCopy full SHA for 84aa9ce
documentation/modules/exploit/multi/http/phpmailer_arg_injection.md
@@ -18,6 +18,17 @@ exploitation can take a few minutes.
18
6. Verify the module yields a PHP meterpreter session in < 5 minutes
19
7. Verify the malicious PHP file was automatically removed
20
21
+## Options
22
+
23
+### WaitTimeout
24
+Seconds to wait to trigger the payload
25
+### NameField
26
+Name of the element for the Name field
27
+### EmailField
28
+Name of the element for the Email field
29
+### MessageField
30
+Name of the element for the Message field
31
32
## Scenarios
33
34
Demo taken directly from [PR7768](https://github.com/rapid7/metasploit-framework/pull/7768)
0 commit comments