Skip to content

Commit 102d28b

Browse files
committed
Update atutor_filemanager_traversal
1 parent 9cb43f2 commit 102d28b

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

modules/exploits/linux/http/atutor_filemanager_traversal.rb

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,11 @@ def initialize(info={})
2323
You are required to login to the target to reach the vulnerability, however this can be
2424
done as a student account and remote registration is enabled by default.
2525
26-
Just incase remote registration isnt enabled, this module uses 2 vulnerabilities
27-
in order to bypass the authenication:
26+
Just in case remote registration isn't enabled, this module uses 2 vulnerabilities
27+
in order to bypass the authentication:
2828
2929
1. confirm.php Authentication Bypass Type Juggling vulnerability
3030
2. password_reminder.php Remote Password Reset TOCTOU vulnerability
31-
32-
~ spirit of the hack
3331
},
3432
'License' => MSF_LICENSE,
3533
'Author' =>
@@ -284,7 +282,7 @@ def login(username, password, check=false)
284282
},
285283
})
286284
# poor php developer practices
287-
cookie = "ATutorID=#{$4};" if res.get_cookies =~ /ATutorID=(.*); ATutorID=(.*); ATutorID=(.*); ATutorID=(.*);/
285+
cookie = "ATutorID=#{$4};" if res && res.get_cookies =~ /ATutorID=(.*); ATutorID=(.*); ATutorID=(.*); ATutorID=(.*);/
288286
if res && res.code == 302
289287
if res.redirection.to_s.include?('bounce.php?course=0')
290288
return cookie

0 commit comments

Comments
 (0)