Skip to content

Commit b35da0d

Browse files
committed
Avoid USERNAME and PASSWORD datastore options collisions
1 parent 52c4be7 commit b35da0d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/freebsd/http/watchguard_cmd_exec.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ def initialize(info = {})
5252
register_options(
5353
[
5454
OptString.new('TARGETURI', [true, 'The target URI', '/']),
55-
OptString.new('USERNAME', [true, 'Web interface user account to add', 'backdoor']),
56-
OptString.new('PASSWORD', [true, 'Web interface user password', 'backdoor']),
55+
OptString.new('WATCHGUARD_USER', [true, 'Web interface user account to add', 'backdoor']),
56+
OptString.new('WATCHGUARD_PASSWORD', [true, 'Web interface user password', 'backdoor']),
5757
OptInt.new('HTTPDELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10]),
5858
Opt::RPORT(443)
5959
],
@@ -210,8 +210,8 @@ def send_cmd_exec(uri,os_cmd,blocking=false)
210210

211211
def get_session
212212
#Gets a valid login session, either valid creds or the SQLi vulnerability
213-
username = datastore['USERNAME']
214-
pwd_clear = datastore['PASSWORD']
213+
username = datastore['WATCHGUARD_USER']
214+
pwd_clear = datastore['WATCHGUARD_PASSWORD']
215215
user_id = rand(999)
216216

217217
sid_cookie = attempt_login(username, pwd_clear)

0 commit comments

Comments
 (0)