You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/auxiliary/scanner/http/meteocontrol_weblog_extractadmin.rb
+25-22Lines changed: 25 additions & 22 deletions
Original file line number
Diff line number
Diff line change
@@ -13,21 +13,21 @@ class MetasploitModule < Msf::Auxiliary
13
13
14
14
definitialize(info={})
15
15
super(update_info(info,
16
-
'Name'=>'Meteocontrol WEBlog Password Extractor',
16
+
'Name'=>'Meteocontrol WEBlog Password Extractor',
17
17
'Description'=>%{
18
18
This module exploits an authentication bypass vulnerability in Meteocontrol WEBLog appliances (software version < May 2016 release) to extract Administrator password for the device management portal.
# In some models, 'Website password' page is renamed or not present. Therefore, password can not be extracted. Check login manually on http://IP:port/html/en/confAccessProt.html for the szWebAdminPassword field's value.
103
+
print_error("Check login manually on http://#{rhost}:#{rport}/html/en/confAccessProt.html for the 'szWebAdminPassword' field's value.")
104
+
end
101
105
else
102
-
# In some models, 'Website password' page is renamed or not present. Therefore, password can not be extracted. Try login manually in such cases.
103
-
print_error("Password not found. Check login manually.")
106
+
print_error("Check login manually on http://#{rhost}:#{rport}/html/en/confAccessProt.html for the 'szWebAdminPassword' field's value.")
0 commit comments