Skip to content

Commit 1d1c37b

Browse files
committed
add in documentation for options
1 parent 835ff44 commit 1d1c37b

File tree

1 file changed

+16
-0
lines changed

1 file changed

+16
-0
lines changed

documentation/modules/auxiliary/gather/solarwinds_servu_fileread_cve_2024_28995.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,22 @@ Windows target, as it is locked by the `Serv-U.exe` process and cannot be opened
3434
6. `check`
3535
7. `run`
3636

37+
## Options
38+
39+
### STORE_LOOT
40+
Whether the read file's contents should be stored as loot in the Metasploit database. If set to false, the files
41+
content will be displayed in the console. (default: true).
42+
43+
### TARGETURI
44+
The base URI path to the web application (default: /).
45+
46+
### TARGETFILE
47+
The absolute path of a target file to read (default: /etc/passwd).
48+
49+
### PATH_TRAVERSAL_COUNT
50+
The number of double dot (..) path segments needed to traverse to the root folder. For a default install of Serv-U
51+
on both Linux and Windows, the value for this is 4. (default: 4).
52+
3753
## Scenarios
3854

3955
### A vulnerable Linux target

0 commit comments

Comments
 (0)