diff --git a/modules/exploits/linux/http/f5_icontrol_rce.rb b/modules/exploits/linux/http/f5_icontrol_rce.rb index d2e022c90a..6d4ad45989 100644 --- a/modules/exploits/linux/http/f5_icontrol_rce.rb +++ b/modules/exploits/linux/http/f5_icontrol_rce.rb @@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote ['URL', 'https://www.horizon3.ai/f5-icontrol-rest-endpoint-authentication-bypass-technical-deep-dive/'] ], 'License' => MSF_LICENSE, - 'DisclosureDate' => '2022-04-05', # Vendor advisory + 'DisclosureDate' => '2022-05-04', # Vendor advisory 'Platform' => ['unix', 'linux'], 'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64], 'Privileged' => true, @@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Arch' => ARCH_CMD, 'Type' => :unix_cmd, 'DefaultOptions' => { - 'PAYLOAD' => 'cmd/unix/reverse_python_ssl' + 'PAYLOAD' => 'cmd/unix/python/meterpreter/reverse_tcp' } } ], @@ -60,6 +60,7 @@ class MetasploitModule < Msf::Exploit::Remote ], 'DefaultTarget' => 0, 'DefaultOptions' => { + 'RPORT' => 443, 'SSL' => true }, 'Notes' => {