We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9054faf commit 1546aa6Copy full SHA for 1546aa6
modules/exploits/windows/oracle/client_system_analyzer_upload.rb
@@ -96,9 +96,7 @@ def upload_file(data)
96
res = send_request_cgi(
97
{
98
'uri' => '/em/ecm/csa/v10103/CSAr.jsp',
99
- 'version' => '1.1',
100
'method' => 'POST',
101
- 'ctype' => "application/x-www-form-urlencoded",
102
'data' => data
103
})
104
@@ -122,11 +120,7 @@ def check
122
120
end
123
121
124
print_status("Checking uploaded contents...")
125
- res = send_request_cgi(
126
- {
127
- 'uri' => "/em/CSA#{file_name}.txt",
128
- 'method' => 'GET'
129
- })
+ res = send_request_raw({'uri' => "/em/CSA#{file_name}.txt"})
130
131
if res and res.code == 200 and res.body =~ /#{file_contents}/
132
return Exploit::CheckCode::Vulnerable
0 commit comments