@@ -52,8 +52,8 @@ def initialize(info = {})
52
52
register_options (
53
53
[
54
54
OptString . new ( 'TARGETURI' , [ true , 'The target URI' , '/' ] ) ,
55
- OptString . new ( 'USERNAME ' , [ true , 'Web interface user account to add' , 'backdoor' ] ) ,
56
- OptString . new ( 'PASSWORD ' , [ true , 'Web interface user password' , 'backdoor' ] ) ,
55
+ OptString . new ( 'WATCHGUARD_USER ' , [ true , 'Web interface user account to add' , 'backdoor' ] ) ,
56
+ OptString . new ( 'WATCHGUARD_PASSWORD ' , [ true , 'Web interface user password' , 'backdoor' ] ) ,
57
57
OptInt . new ( 'HTTPDELAY' , [ true , 'Time that the HTTP Server will wait for the payload request' , 10 ] ) ,
58
58
Opt ::RPORT ( 443 )
59
59
] ,
@@ -210,8 +210,8 @@ def send_cmd_exec(uri,os_cmd,blocking=false)
210
210
211
211
def get_session
212
212
#Gets a valid login session, either valid creds or the SQLi vulnerability
213
- username = datastore [ 'USERNAME ' ]
214
- pwd_clear = datastore [ 'PASSWORD ' ]
213
+ username = datastore [ 'WATCHGUARD_USER ' ]
214
+ pwd_clear = datastore [ 'WATCHGUARD_PASSWORD ' ]
215
215
user_id = rand ( 999 )
216
216
217
217
sid_cookie = attempt_login ( username , pwd_clear )
0 commit comments