Class: Wpxf::Module
- Inherits:
-
Object
- Object
- Wpxf::Module
- Includes:
- Db::Credentials, ModuleAuthentication, ModuleInfo, Net::HttpClient, Options, OutputEmitters, WordPress::Fingerprint, WordPress::Login, WordPress::Options, WordPress::Urls
- Defined in:
- lib/wpxf/core/module.rb
Overview
The base class for all modules.
Direct Known Subclasses
Auxiliary::AdWidgetPhpFileDownload, Auxiliary::AllInOneMigrationExport, Auxiliary::AntiochArbitraryFileDownload, Auxiliary::CandidateApplicationFormArbitraryFileDownload, Auxiliary::CpImageStoreArbitraryFileDownload, Auxiliary::CustomContactFormsPrivilegeEscalation, Auxiliary::DirectDownloadForWoocommerceFileDownload, Auxiliary::DownloadManagerAuthenticatedPrivilegeEscalation, Auxiliary::DownloadManagerDirectoryListingDisclosure, Auxiliary::DownloadManagerPrivilegeEscalation, Auxiliary::DownloadMonitorLogExport, Auxiliary::DuplicatorCsrfDbExport, Auxiliary::EasyCartPrivilegeEscalation, Auxiliary::EmailSubscribersUserListDisclosure, Auxiliary::EmailUsersCsrfBulkMail, Auxiliary::EventsHashDump, Auxiliary::FileManagerDatabaseCredentialsDisclosure, Auxiliary::GalleryAlbumHashDump, Auxiliary::GhostUnrestrictedExportDownload, Auxiliary::HistoryCollectionArbitraryFileDownload, Auxiliary::ImdbProfileWidgetArbitraryFileDownload, Auxiliary::JtrtResponsiveTablesHashDump, Auxiliary::LoadScriptsDos, Auxiliary::LongPasswordDos, Auxiliary::MailMastaUnauthenticatedLocalFileInclusion, Auxiliary::MembershipSimplifiedArbitraryFileDownload, Auxiliary::MemphisDocumentsLibraryArbitraryFileDownload, Auxiliary::PlatformPrivilegeEscalation, Auxiliary::PostGridFileDeletion, Auxiliary::QardsLocalPortScan, Auxiliary::RecentBackupsArbitraryFileDownload, Auxiliary::RegistrationMagicHashDump, Auxiliary::SimpleAdsManagerHashDump, Auxiliary::SimpleAdsManagerSqlInjection, Auxiliary::SimpleDownloadMonitorFileDisclosure, Auxiliary::SimpleDownloadMonitorFileDownload, Auxiliary::SimpleEventsCalendarHashDump, Auxiliary::SimpleImageManipulatorArbitraryFileDownload, Auxiliary::SiteEditorFileDownload, Auxiliary::SqlShortcodeHashDump, Auxiliary::SuperSocializerAuthBypass, Auxiliary::UltimateCsvImporterUserExtract, Auxiliary::UltimateProductCatalogueHashDump, Auxiliary::UserMetaManagerInformationDisclosure, Auxiliary::UserMetaManagerPrivilegeEscalation, Auxiliary::UserRoleEditorPrivilegeEscalation, Auxiliary::WoocommerceEmailTestOrderDisclosure, Auxiliary::WoocommerceOrderImportExportOrderDisclosure, Auxiliary::Wp472CsrfDos, Auxiliary::Wp47UserInfoDisclosure, Auxiliary::WpBackgroundTakeoverFileDownload, Auxiliary::WpFrontEndProfilePrivilegeEscalation, Auxiliary::WpHideSecurityEnhancerFileDownload, Auxiliary::WpMarketplaceV24FileDownload, Auxiliary::WpV471ContentInjection, Auxiliary::WpVaultFileDownload, Auxiliary::WplmsPrivilegeEscalation, Auxiliary::WptfImageGalleryArbitraryFileDownload, Exploit::AccessPressAnonymousPostProShellUpload, Exploit::AcfFrontendDisplayShellUpload, Exploit::AdblockBlockerShellUpload, Exploit::AdminCustomLoginReflectedXssShellUpload, Exploit::AdminManagementXtendedXssShellUpload, Exploit::AdminShellUpload, Exploit::AdvancedCustomFieldsRemoteFileInclusion, Exploit::AffiliateAdsBuilderReflectedXssShellUpload, Exploit::AffiliateWPReflectedXssShellUpload, Exploit::AjaxRandomPostReflectedXssShellUpload, Exploit::AllInOneMigrationReflectedXssShellUpload, Exploit::AllInOneSchemaRichSnippetsReflectedXssShellUpload, Exploit::AllInOneSeoPackXssShellUpload, Exploit::AllInOneWpSecurityReflectedXssShellUpload, Exploit::AloEasymailCsrfXssShellUpload, Exploit::AlpinePhotoTileForInstagramReflectedXssShellUpload, Exploit::AnswerMyQuestionReflectedXssShellUpload, Exploit::AntiPlagiarismReflectedXssShellUpload, Exploit::AnyvarReflectedXssShellUpload, Exploit::AppointmentScheduleBookingSystemStoredXssShellUpload, Exploit::ArabicFontCsrfStoredXssShellUpload, Exploit::AtahualpaReflectedXssShellUpload, Exploit::BackupGuardReflectedXssShellUpload, Exploit::BraftonContentImporterReflectedXssShellUpload, Exploit::BwsPanelReflectedXssShellUpload, Exploit::CalderaFormsStoredXssShellUpload, Exploit::CalderaFormsV154XssShellUpload, Exploit::CheckEmailReflectedXssShellUpload, Exploit::ClaptasticClapButtonReflectedXssShellUpload, Exploit::CodeSnippetsReflectedXssShellUpload, Exploit::ColorwayReflectedXssShellUpload, Exploit::ConcoursReflectedXssShellUpload, Exploit::ConnectionsReflectedXssShellUpload, Exploit::ContentAuditCsrfStoredXssShellUpload, Exploit::ContentGrabberReflectedXssShellUpload, Exploit::ContentSlideReflectedXssShellUpload, Exploit::CountPerDayReflectedXssShellUpload, Exploit::CreativeContactFormShellUpload, Exploit::CsvImportExportReflectedXssShellUpload, Exploit::CsvImportReflectedXssShellUpload, Exploit::CustomMapReflectedXssShellUpload, Exploit::CustomMetasReflectedXssShellUpload, Exploit::CustomPermalinksReflectedXssShellUpload, Exploit::DefaOnlineImageProtectorReflectedXssShellUpload, Exploit::DeleteAllCommentsShellUpload, Exploit::DesignfolioPlusShellUpload, Exploit::DownloadManagerReflectedXssShellUpload, Exploit::DuplicatorCsrfXssShellUpload, Exploit::DwQuestionAnswerStoredXssShellUpload, Exploit::DwnldrXssShellUpload, Exploit::EasyCartShellUpload, Exploit::EasyContactFormBuilderReflectedXssShellUpload, Exploit::EmagMarketplaceConnectorXssShellUpload, Exploit::EmailUsersReflectedXssShellUpload, Exploit::EmbedCommentImagesStoredXssShellUpload, Exploit::EnhancedTooltipGlossaryReflectedXssShellUpload, Exploit::EstatikV225ShellUpload, Exploit::EventsMadeEasyReflectedXssShellUpload, Exploit::FaqWdReflectedXssShellUpload, Exploit::FastImageAdderV11RfiShellUpload, Exploit::FlickrPictureBackupRfiShellUpload, Exploit::FlickrRssCsrfStoredXssShellUpload, Exploit::FormbuilderReflectedXssShellUpload, Exploit::Four04ToThree01StoredXssShellUpload, Exploit::FrontEndFileUploadAndManagerShellUpload, Exploit::GdRatingSystemReflectedXssShellUpload, Exploit::GoogleAnalyticsDashboardReflectedXssShellUpload, Exploit::GoogleMapsReflectedXssShellUpload, Exploit::GravityFormsV1819ShellUpload, Exploit::GravityFormsV191511ReflectedXssShellUpload, Exploit::GwolleGuestbookRemoteFileInclusion, Exploit::GwolleGuestbookStoredXssShellUpload, Exploit::HdwTubeReflectedXssShellUpload, Exploit::HeroMapsProReflectedXssShellUpload, Exploit::HugeItImageGalleryReflectedXssShellUpload, Exploit::ImageInjectCsrfStoredXssShellUpload, Exploit::ImportWoocommerceReflectedXssShellUpload, Exploit::ImpressListingsReflectedXssShellUpload, Exploit::InboundioMarketingShellUpload, Exploit::IndexistoReflectedXssShellUpload, Exploit::InfusionsoftReflectedXssShellUpload, Exploit::InfusionsoftShellUpload, Exploit::InstagramFeedCsrfStoredXssShellUpload, Exploit::InstagramFeedCsrfXssShellUpload, Exploit::InstalinkerReflectedXssShellUpload, Exploit::IthemesSecurityStoredXssShellUpload, Exploit::IthemesSecurityV690StoredXssShellUpload, Exploit::JobManagerReflectedXssShellUpload, Exploit::LeenkmeReflectedXssShellUpload, Exploit::LightboxReflectedXssShellUpload, Exploit::LinkLibraryReflectedXssShellUpload, Exploit::MagicFieldsReflectedXssShellUpload, Exploit::MailchimpForWpReflectedXssShellUpload, Exploit::MailcwpUnauthenticatedShellUpload, Exploit::MailpoetNewslettersReflectedXssShellUpload, Exploit::MailpoetNewslettersShellUpload, Exploit::MailpoetNewslettersV272ReflectedXssShellUpload, Exploit::MasterSliderReflectedXssShellUpload, Exploit::MaxbuttonsReflectedXssShellUpload, Exploit::MdcPrivateMessageXssShellUpload, Exploit::MinimaxPageLayoutBuilderReflectedXssShellUpload, Exploit::MobileAppNativeV3ShellUpload, Exploit::MsmcRedirectAfterCommentReflectedXssShellUpload, Exploit::NMediaWebsiteContactFormShellUpload, Exploit::NMediaWebsiteContactFormV19ShellUpload, Exploit::NeosenseShellUpload, Exploit::NewYearFireworkReflectedXssShellUpload, Exploit::NewsletterBySupsysticCsrfStoredXssShellUpload, Exploit::NinjaFormsReflectedXssShellUpload, Exploit::NinjaFormsUnauthenticatedShellUpload, Exploit::NoExternalLinksReflectedXssShellUpload, Exploit::OcimMp3ReflectedXssShellUpload, Exploit::ParticipantsDatabaseV1548ShellUpload, Exploit::ParticipantsDatabaseV1759XssShellUpload, Exploit::PetersLoginRedirectReflectedXssShellUpload, Exploit::PhotoAlbumPlusXssShellUpload, Exploit::PhotoGalleryReflectedXssShellUpload, Exploit::PhotoGalleryShellUpload, Exploit::PinterestFeedReflectedXssShellUpload, Exploit::PodlovePodcastPublisherReflectedXssShellUpload, Exploit::PondolFormToMailReflectedXssShellUpload, Exploit::PootleButtonReflectedXssShellUpload, Exploit::PopcashIntegrationXssShellUpload, Exploit::PopupMakerReflectedXssShellUpload, Exploit::PortfolioReflectedXssShellUpload, Exploit::ProfileBuilderReflectedXssShellUpload, Exploit::PropertyHiveReflectedXssShellUpload, Exploit::QuizAndSurveyMasterReflectedXssShellUpload, Exploit::QuotesCollectionReflectedXssShellUpload, Exploit::ReflexGalleryShellUpload, Exploit::RegistrationMagicReflectedXssShellUpload, Exploit::ResponsiveLightboxReflectedXssShellUpload, Exploit::RevsliderShellUpload, Exploit::RockhoistBadgesReflectedXssShellUpload, Exploit::SafeEditorXssShellUpload, Exploit::SimpelReserverenReflectedXssShellUpload, Exploit::SimpleSlideshowManagerReflectedXssShellUpload, Exploit::SimplecartShellUpload, Exploit::SlideshowGalleryReflectedXssShellUpload, Exploit::SmartGoogleCodeInserterXssShellUpload, Exploit::SmartMarketingReflectedXssShellUpload, Exploit::SocialMediaWidgetCsrfXssShellUpload, Exploit::SocialPugReflectedXssShellUpload, Exploit::SpProjectDocumentManagerReflectedXssShellUpload, Exploit::SpamfreeReflectedXssShellUpload, Exploit::SpiffyCalendarReflectedXssShellUpload, Exploit::SplashingImagesReflectedXssShellUpload, Exploit::SrbtranslatinCsrfXssShellUpload, Exploit::SuperSocializerShellUpload, Exploit::SymposiumShellUpload, Exploit::TevolutionShellUpload, Exploit::TidioGalleryReflectedXssShellUpload, Exploit::TrackingCodeManagerReflectedXssShellUpload, Exploit::TribulantNewsletterReflectedXssShellUpload, Exploit::TribulantSlideshowGalleryReflectedXssShellUpload, Exploit::TrustFormReflectedXssShellUpload, Exploit::TwoKbAmazonAffiliatesStoreReflectedXssShellUpload, Exploit::UltimateAddonsForVCAuthenticatedStoredXssShellUpload, Exploit::UltimateAddonsForVCReflectedStoredXssShellUpload, Exploit::UltimateCsvImporterReflectedXssShellUpload, Exploit::UltimateFormBuilderLiteReflectedXssShellUpload, Exploit::UltimateMemberShellUpload, Exploit::UltimateProductCatalogueShellUpload, Exploit::UniversalAnalyticsAuthenticatedXssShellUpload, Exploit::UserAccessManagerReflectedXssShellUpload, Exploit::UserLoginHistoryReflectedXssShellUpload, Exploit::UserLoginLogXssShellUpload, Exploit::UserProShellUpload, Exploit::W3TotalCacheReflectedXssShellUpload, Exploit::WPSupportPlusResponsiveTicketSystemShellUpload, Exploit::WangGuardReflectedXssShellUpload, Exploit::WhizzReflectedXssShellUpload, Exploit::WindowsDesktopAndIphonePhotoUploaderShellUpload, Exploit::WooCustomCheckoutFieldXssShellUpload, Exploit::WooEmailControlReflectedXssShellUpload, Exploit::WoocommerceAmazonAffiliatesV8ShellUpload, Exploit::WoocommerceProductAddonsShellUpload, Exploit::WordpressFirewallReflectedXssShellUpload, Exploit::WorkTheFlowShellUpload, Exploit::Wp43ShortcodeXssShellUpload, Exploit::Wp44XssShellUpload, Exploit::WpAdvancedImporterReflectedXssShellUpload, Exploit::WpFilebaseDownloadManagerReflectedXssShellUpload, Exploit::WpFrontEndRepositoryManagerShellUpload, Exploit::WpGoogleMapsStoredXssShellUpload, Exploit::WpLiveChatSupportReflectedXssShellUpload, Exploit::WpLiveChatSupportStoredXssShellUpload, Exploit::WpMailsterReflectedXssShellUpload, Exploit::WpMarketplaceShellUpload, Exploit::WpMembersReflectedXssShellUpload, Exploit::WpMobileDetectorRfiShellUpload, Exploit::WpPiwikStoredXssShellUpload, Exploit::WpRetina2xReflectedXssShellUpload, Exploit::WpStatistics1209ReflectedXssShellUpload, Exploit::WpStatisticsReflectedXssShellUpload, Exploit::WpWhoisDomainReflectedXssShellUpload, Exploit::WpshopShellUpload, Exploit::WpsolrReflectedXssShellUpload, Exploit::WptouchAuthenticatedShellUpload, Exploit::WsecureLiteShellUpload, Exploit::YoastSeoXssShellUpload, Exploit::ZurlPreviewReflectedXssShellUpload
Constant Summary
Constants included from WordPress::Options
WordPress::Options::WP_OPTION_CONTENT_DIR
Constants included from Net::HttpOptions
Net::HttpOptions::HTTP_OPTION_BASIC_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_CLIENT_TIMEOUT, Net::HttpOptions::HTTP_OPTION_FOLLOW_REDIRECT, Net::HttpOptions::HTTP_OPTION_HOST, Net::HttpOptions::HTTP_OPTION_HOST_VERIFICATION, Net::HttpOptions::HTTP_OPTION_MAX_CONCURRENCY, Net::HttpOptions::HTTP_OPTION_PEER_VERIFICATION, Net::HttpOptions::HTTP_OPTION_PORT, Net::HttpOptions::HTTP_OPTION_PROXY, Net::HttpOptions::HTTP_OPTION_PROXY_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_SSL, Net::HttpOptions::HTTP_OPTION_TARGET_URI, Net::HttpOptions::HTTP_OPTION_USER_AGENT, Net::HttpOptions::HTTP_OPTION_VHOST
Instance Attribute Summary collapse
-
#active_workspace ⇒ Models::Workspace
The currently active Wpxf::Models::Workspace.
-
#event_emitter ⇒ EventEmitter
The EventEmitter for the module’s events.
-
#payload ⇒ Payload
The Payload to use with the current module.
-
#session_cookie ⇒ String?
readonly
The current session cookie, if authenticated with the target.
Attributes included from Options
Instance Method Summary collapse
-
#aux_module? ⇒ Boolean
True if the module is an auxiliary module.
-
#can_execute? ⇒ Boolean
True if all the required options are set.
-
#check ⇒ Symbol
Check if the target is vulnerable.
-
#check_wordpress_and_online ⇒ Boolean
True if the target is running WordPress.
-
#cleanup ⇒ Object
Cleanup any allocated resource to the module.
-
#exploit_module? ⇒ Boolean
True if the module is an exploit module.
-
#initialize ⇒ Module
constructor
A new instance of Module.
-
#missing_options ⇒ Array
An array of missing option names that are required.
-
#run ⇒ Boolean
Run the module.
-
#set_option_value(name, value) ⇒ String, Symbol
Set the value of a module option.
-
#unset_option(name) ⇒ Object
Unset an option or reset it back to its default value.
Methods included from Db::Credentials
Methods included from ModuleAuthentication
#authenticate_with_wordpress, #requires_authentication
Methods included from WordPress::Urls
#wordpress_url_admin, #wordpress_url_admin_ajax, #wordpress_url_admin_options, #wordpress_url_admin_post, #wordpress_url_admin_profile, #wordpress_url_admin_update, #wordpress_url_atom, #wordpress_url_author, #wordpress_url_comments_post, #wordpress_url_login, #wordpress_url_new_user, #wordpress_url_opml, #wordpress_url_plugin_install, #wordpress_url_plugin_upload, #wordpress_url_plugins, #wordpress_url_post, #wordpress_url_rdf, #wordpress_url_readme, #wordpress_url_rest_api, #wordpress_url_rss, #wordpress_url_sitemap, #wordpress_url_themes, #wordpress_url_uploads, #wordpress_url_wp_content, #wordpress_url_xmlrpc
Methods included from WordPress::Options
Methods included from WordPress::Login
#valid_wordpress_cookie?, #wordpress_login, #wordpress_login_post_body
Methods included from WordPress::Fingerprint
#check_plugin_version_from_changelog, #check_plugin_version_from_readme, #check_theme_version_from_readme, #check_theme_version_from_style, #check_version_from_custom_file, #wordpress_and_online?, #wordpress_version
Methods included from Net::HttpClient
#base_http_headers, #base_uri, #download_file, #execute_delete_request, #execute_get_request, #execute_post_request, #execute_put_request, #execute_queued_requests, #execute_request, #full_uri, #initialize_advanced_options, #initialize_options, #max_http_concurrency, #normalize_relative_uri, #normalize_uri, #queue_request, #target_host, #target_port, #target_uri
Methods included from Net::TyphoeusHelper
#advanced_typhoeus_options, #create_typhoeus_request, #create_typhoeus_request_options, #standard_typhoeus_options
Methods included from Net::UserAgent
#clients_by_frequency, #random_browser_and_os, #random_chrome_platform_string, #random_firefox_platform_string, #random_firefox_version_string, #random_iexplorer_platform_string, #random_opera_platform_string, #random_processor_string, #random_safari_platform_string, #random_time_string, #random_user_agent
Methods included from Versioning::OSVersions
#random_nt_version, #random_osx_version
Methods included from Versioning::BrowserVersions
#random_chrome_build_number, #random_chrome_version, #random_ie_version, #random_opera_version, #random_presto_version, #random_presto_version2, #random_safari_build_number, #random_safari_version, #random_trident_version
Methods included from Options
#all_options_valid?, #get_option, #get_option_value, #normalized_option_value, #option_valid?, #option_value?, #register_advanced_options, #register_evasion_options, #register_option, #register_options, #scoped_option_change, #unregister_option
Methods included from OutputEmitters
#emit_error, #emit_info, #emit_success, #emit_table, #emit_warning
Methods included from ModuleInfo
#emit_usage_info, #module_author, #module_date, #module_desc, #module_description_preformatted, #module_name, #module_references, #update_info
Constructor Details
#initialize ⇒ Module
Returns a new instance of Module.
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
# File 'lib/wpxf/core/module.rb', line 17 def initialize super register_option( BooleanOption.new( name: 'verbose', desc: 'Enable verbose output', required: true, default: false ) ) ([ BooleanOption.new( name: 'check_wordpress_and_online', desc: 'Check that the target is running WordPress and is online', required: true, default: true ) ]) self.event_emitter = EventEmitter.new end |
Instance Attribute Details
#active_workspace ⇒ Models::Workspace
Returns the currently active Wpxf::Models::Workspace.
135 136 137 |
# File 'lib/wpxf/core/module.rb', line 135 def active_workspace @active_workspace end |
#event_emitter ⇒ EventEmitter
Returns the EventEmitter for the module’s events.
132 133 134 |
# File 'lib/wpxf/core/module.rb', line 132 def event_emitter @event_emitter end |
#payload ⇒ Payload
Returns the Payload to use with the current module.
129 130 131 |
# File 'lib/wpxf/core/module.rb', line 129 def payload @payload end |
#session_cookie ⇒ String? (readonly)
Returns the current session cookie, if authenticated with the target.
138 139 140 |
# File 'lib/wpxf/core/module.rb', line 138 def @session_cookie end |
Instance Method Details
#aux_module? ⇒ Boolean
Returns true if the module is an auxiliary module.
119 120 121 |
# File 'lib/wpxf/core/module.rb', line 119 def aux_module? to_s.split('::')[-2].eql? 'Auxiliary' end |
#can_execute? ⇒ Boolean
Returns true if all the required options are set.
42 43 44 |
# File 'lib/wpxf/core/module.rb', line 42 def can_execute? && (aux_module? || (payload&.)) end |
#check ⇒ Symbol
Check if the target is vulnerable.
114 115 116 |
# File 'lib/wpxf/core/module.rb', line 114 def check :unknown end |
#check_wordpress_and_online ⇒ Boolean
Returns true if the target is running WordPress.
47 48 49 50 51 52 53 54 |
# File 'lib/wpxf/core/module.rb', line 47 def check_wordpress_and_online unless wordpress_and_online? emit_error "#{full_uri} does not appear to be running WordPress" return false end true end |
#cleanup ⇒ Object
Cleanup any allocated resource to the module.
108 109 110 |
# File 'lib/wpxf/core/module.rb', line 108 def cleanup payload&.cleanup end |
#exploit_module? ⇒ Boolean
Returns true if the module is an exploit module.
124 125 126 |
# File 'lib/wpxf/core/module.rb', line 124 def exploit_module? to_s.split('::')[-2].eql? 'Exploit' end |
#missing_options ⇒ Array
Returns an array of missing option names that are required.
57 58 59 60 61 62 63 64 65 66 67 |
# File 'lib/wpxf/core/module.rb', line 57 def opts = super opts.push('payload') if exploit_module? && !payload if payload payload_opts = payload. opts = [*opts, *payload_opts] unless payload_opts.empty? end opts end |
#run ⇒ Boolean
Run the module.
94 95 96 97 98 99 100 101 102 103 104 105 |
# File 'lib/wpxf/core/module.rb', line 94 def run if normalized_option_value('check_wordpress_and_online') return false unless check_wordpress_and_online end if requires_authentication @session_cookie = authenticate_with_wordpress(datastore['username'], datastore['password']) return false unless @session_cookie end true end |
#set_option_value(name, value) ⇒ String, Symbol
Set the value of a module option.
74 75 76 77 78 79 80 81 82 83 |
# File 'lib/wpxf/core/module.rb', line 74 def set_option_value(name, value) res = super(name, value) if payload return payload.set_option_value(name, value) if res == :not_found payload.set_option_value(name, value) end res end |
#unset_option(name) ⇒ Object
Unset an option or reset it back to its default value.
87 88 89 90 |
# File 'lib/wpxf/core/module.rb', line 87 def unset_option(name) super(name) payload&.unset_option(name) end |