We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e93b4d4 commit e0383b4Copy full SHA for e0383b4
modules/exploits/multi/http/clinic_pms_sqli_to_rce.rb
@@ -8,6 +8,7 @@ class MetasploitModule < Msf::Exploit::Remote
8
include Msf::Exploit::Remote::HttpClient
9
include Msf::Exploit::PhpEXE
10
include Msf::Exploit::FileDropper
11
+ include Msf::Auxiliary::Report
12
13
def initialize(info = {})
14
super(
@@ -152,6 +153,13 @@ def trigger_payload
152
153
logout
154
login_sqli
155
156
+ report_vuln(
157
+ host: datastore['RHOSTS'],
158
+ name: name,
159
+ refs: references,
160
+ info: 'The target is vulnerable to CVE-2025-3096.'
161
+ )
162
+
163
res = send_request_cgi({
164
'uri' => normalize_uri(target_uri.path + '/update_user.php'),
165
'method' => 'GET',
0 commit comments