From a69d941a72a24609bfefdb89d3498940c6c24610 Mon Sep 17 00:00:00 2001 From: ddouhine Date: Thu, 13 Aug 2020 16:18:28 +0200 Subject: [PATCH] Update modules/exploits/linux/http/geutebruck_testaction_exec.rb Co-authored-by: bcoles --- modules/exploits/linux/http/geutebruck_testaction_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/http/geutebruck_testaction_exec.rb b/modules/exploits/linux/http/geutebruck_testaction_exec.rb index 3faec27959..c52dd9bcfc 100644 --- a/modules/exploits/linux/http/geutebruck_testaction_exec.rb +++ b/modules/exploits/linux/http/geutebruck_testaction_exec.rb @@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Remote OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'root' ]), OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]), OptString.new('TARGETURI', [true, 'The path to the testaction page', '/uapi-cgi/admin/testaction.cgi']), - ], self.class) + ]) end def check