File tree Expand file tree Collapse file tree 1 file changed +7
-6
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +7
-6
lines changed Original file line number Diff line number Diff line change @@ -16,18 +16,19 @@ class Metasploit3 < Msf::Exploit::Remote
16
16
17
17
def initialize
18
18
super (
19
- 'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution' ,
19
+ 'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution' ,
20
20
'Description' => %q{
21
21
This module exploits an authentication bypass vulnerability on Avaya IP Office
22
22
Customer Call Reporter, which allows a remote user to upload arbitrary files
23
23
through the ImageUpload.ashx component. It can be abused to upload and execute
24
24
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
25
25
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
26
26
} ,
27
- 'Author' => [
28
- 'rgod <rgod[at]autistici.org>' , # Vulnerability discovery
29
- 'juan vazquez' # Metasploit module
30
- ] ,
27
+ 'Author' =>
28
+ [
29
+ 'rgod <rgod[at]autistici.org>' , # Vulnerability discovery
30
+ 'juan vazquez' # Metasploit module
31
+ ] ,
31
32
'Platform' => 'win' ,
32
33
'References' =>
33
34
[
@@ -173,7 +174,7 @@ def exploit
173
174
'method' => 'GET'
174
175
} , 20 )
175
176
176
- if ( !res or res . code != 200 )
177
+ if ( !res or ( res and res . code != 200 ) )
177
178
print_error ( "#{ @peer } - Execution failed on #{ payload_url } [No Response]" )
178
179
return
179
180
end
You can’t perform that action at this time.
0 commit comments