rastating / wordpress-exploit-framework

A Ruby framework designed to aid in the penetration testing of WordPress systems.
https://rastating.github.io/wordpress-exploit-framework
GNU General Public License v3.0
1.02k stars 265 forks source link

One or more required options not set: payload #40

Closed megylon closed 7 years ago

megylon commented 7 years ago

wpxf > use exploit/aries_revslider_shell_upload

[+] Loaded module: #

wpxf [exploit/aries_revslider_shell_upload] > show options

Module options:

Name         Current Setting   Required   Description
----------   ---------------   --------   --------------------------------------
host                           true       Address of the target host.
port         80                true       Port the remote host is listening on
proxy                          false      Proxy address ([protocol://]host:port)
ssl          false             true       Use SSL/HTTPS for all requests
target_uri   /                 true       Base path to the WordPress application
verbose      false             true       Enable verbose output
vhost                          false      HTTP server virtual host

wpxf [exploit/aries_revslider_shell_upload] > set host http://xxx.de/

[+] Set host => http://xxx.de/

wpxf [exploit/aries_revslider_shell_upload] > run

[!] One or more required options not set: payload

rastating commented 7 years ago

The problem is in the error message.

Please refrain from posting direct URLs to websites you think are vulnerable too.

megylon commented 7 years ago

yes i set direct url