Skip to content

Commit 846052a

Browse files
committed
s/URIPATH/TARGETURI/g per @jvasquez-r7 comments on another pull.
1 parent ddd7d30 commit 846052a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ def initialize(info={})
3131
))
3232

3333
register_options([
34-
OptString.new('URIPATH', [true, "The URI to test", "/"]),
34+
OptString.new('TARGETURI', [true, "The URI to test", "/"]),
3535
OptEnum.new('HTTP_METHOD', [true, 'HTTP Method', 'POST', ['GET', 'POST', 'PUT']]),
3636
], self.class)
3737
end
3838

3939
def send_probe(pdata)
4040
res = send_request_cgi({
41-
'uri' => datastore['URIPATH'] || "/",
41+
'uri' => datastore['TARGETURI'],
4242
'method' => datastore['HTTP_METHOD'],
4343
'ctype' => 'application/json',
4444
'data' => pdata
@@ -59,7 +59,7 @@ def run_host(ip)
5959

6060
if res1.code.to_s =~ /^[5]/
6161
print_error("#{rhost}:#{rport} The server replied with #{res1.code} for our initial JSON request")
62-
print_error("\t\tDouble check URIPATH and HTTP_METHOD")
62+
print_error("\t\tDouble check TARGETURI and HTTP_METHOD")
6363
return
6464
end
6565

@@ -94,7 +94,7 @@ def run_host(ip)
9494
})
9595
else
9696
# Otherwise we're not likely vulnerable.
97-
vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or URIPATH must be set")
97+
vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or TARGETURI must be set")
9898
end
9999
end
100100

0 commit comments

Comments
 (0)