1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Land #6541, typo fix for cisco_ssl_vpn

This commit is contained in:
William Vu 2016-02-09 17:13:24 -06:00
commit 5f0add2a8b
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743

View File

@ -208,22 +208,22 @@ class Metasploit3 < Msf::Auxiliary
post_params['group_list'] = group unless group.empty? post_params['group_list'] = group unless group.empty?
resp = send_request_cgi( res = send_request_cgi(
'uri' => '/+webvpn+/index.html', 'uri' => '/+webvpn+/index.html',
'method' => 'POST', 'method' => 'POST',
'ctype' => 'application/x-www-form-urlencoded', 'ctype' => 'application/x-www-form-urlencoded',
'cookie' => cookie, 'cookie' => cookie,
'vars_post' => post_params 'vars_post' => post_params
) )
if resp && if res &&
resp.code == 200 && res.code == 200 &&
resp.body.match(/SSL VPN Service/) && res.body.match(/SSL VPN Service/) &&
resp.body.match(/webvpn_logout/i) res.body.match(/webvpn_logout/i)
print_good("#{peer} - SUCCESSFUL LOGIN - #{user.inspect}:#{pass.inspect}:#{group.inspect}") print_good("#{peer} - SUCCESSFUL LOGIN - #{user.inspect}:#{pass.inspect}:#{group.inspect}")
do_logout(resp.get_cookies) do_logout(res.get_cookies)
report_cred(ip: rhost, port: rport, user: user, password: pass, proof: res.body) report_cred(ip: rhost, port: rport, user: user, password: pass, proof: res.body)
report_note(ip: rhost, type: 'cisco.cred.group', data: "User: #{user} / Group: #{group}") report_note(ip: rhost, type: 'cisco.cred.group', data: "User: #{user} / Group: #{group}")