1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Add vim_soap to the mixins list.

Fixes an issue where a different module load order would result in one
of the vmware modules failing to load be cause vim_soap hadn't been
required yet. Thanks d0rm0us3 for having a weird system and spotting
stuff like this.
This commit is contained in:
James Lee 2012-02-20 13:16:05 -07:00
parent cda9166180
commit 89e0842b1e
9 changed files with 8 additions and 15 deletions

View File

@ -53,6 +53,7 @@ require 'msf/core/exploit/pop2'
require 'msf/core/exploit/tns' require 'msf/core/exploit/tns'
require 'msf/core/exploit/db2' require 'msf/core/exploit/db2'
require 'msf/core/exploit/postgres' require 'msf/core/exploit/postgres'
require 'msf/core/exploit/vim_soap'
require 'msf/core/exploit/wdbrpc' require 'msf/core/exploit/wdbrpc'
require 'msf/core/exploit/wdbrpc_client' require 'msf/core/exploit/wdbrpc_client'

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary
@ -42,10 +41,10 @@ class Metasploit3 < Msf::Auxiliary
def run def run
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
vm_ref = vim_find_vm_by_name(datastore['VM']) vm_ref = vim_find_vm_by_name(datastore['VM'])
case vm_ref case vm_ref
when String when String
return_state = vim_powerOFF_vm(vm_ref) return_state = vim_powerOFF_vm(vm_ref)
case return_state case return_state
when 'success' when 'success'
print_good "VM Powered Off Successfully" print_good "VM Powered Off Successfully"
when 'alreadyOFF' when 'alreadyOFF'

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary
@ -43,10 +42,10 @@ class Metasploit3 < Msf::Auxiliary
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
vm_ref = vim_find_vm_by_name(datastore['VM']) vm_ref = vim_find_vm_by_name(datastore['VM'])
case vm_ref case vm_ref
when String when String
return_state = vim_powerON_vm(vm_ref) return_state = vim_powerON_vm(vm_ref)
case return_state case return_state
when 'success' when 'success'
print_good "VM Powered On Successfully" print_good "VM Powered On Successfully"
when 'alreadyON' when 'alreadyON'

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary
@ -24,8 +23,8 @@ class Metasploit3 < Msf::Auxiliary
super( super(
'Name' => 'VMWare Tag Virtual Machine', 'Name' => 'VMWare Tag Virtual Machine',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and This module will log into the Web API of VMWare and
'tag' a specified Virtual Machine. It does this by 'tag' a specified Virtual Machine. It does this by
logging a user event with user supplied text}, logging a user event with user supplied text},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
@ -45,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
vm_ref = vim_find_vm_by_name(datastore['VM']) vm_ref = vim_find_vm_by_name(datastore['VM'])
case vm_ref case vm_ref
when String when String
result = vim_log_event_vm(vm_ref, datastore['MSG']) result = vim_log_event_vm(vm_ref, datastore['MSG'])
case result case result

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary

View File

@ -11,7 +11,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/vim_soap'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary