We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fe4e230 commit 67fc43aCopy full SHA for 67fc43a
modules/exploits/linux/http/trueonline_p660hn_v2_rce.rb
@@ -98,7 +98,8 @@ def exploit
98
@cookie = rand_text_alpha_lower(7)
99
100
res = send_request_cgi({
101
- 'uri' => '/cgi-bin/index.asp?' + Rex::Text.encode_base64("#{datastore['USERNAME']}:#{datastore['PASSWORD']}"),
+ 'uri' => '/cgi-bin/index.asp',
102
+ 'query' => Rex::Text.encode_base64("#{datastore['USERNAME']}:#{datastore['PASSWORD']}"),
103
'method' => 'POST',
104
'cookie' => "SESSIONID=#{@cookie}",
105
'vars_post' => {
0 commit comments