Skip to content

Commit 3db72e9

Browse files
committed
Land rapid7#6853, use send_request_cgi! for CVE-2016-0854 exploit
2 parents 805f98f + 35a780c commit 3db72e9

File tree

1 file changed

+1
-9
lines changed

1 file changed

+1
-9
lines changed

modules/exploits/windows/scada/advantech_webaccess_dashboard_file_upload.rb

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -56,18 +56,11 @@ def version_match(data)
5656
end
5757

5858
def vuln_version?
59-
res = send_request_cgi(
59+
res = send_request_cgi!(
6060
'method' => 'GET',
6161
'uri' => target_uri.to_s
6262
)
6363

64-
if res.redirect?
65-
res = send_request_cgi(
66-
'method' => 'GET',
67-
'uri' => normalize_uri(res.redirection)
68-
)
69-
end
70-
7164
ver = res && res.body ? version_match(res.body) : nil
7265
true ? Gem::Version.new(ver) == Gem::Version.new('8.0') : false
7366
end
@@ -128,4 +121,3 @@ def exploit
128121
return unless exec_file?(filename)
129122
end
130123
end
131-

0 commit comments

Comments
 (0)