We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fcad2c3 commit af8ac2fCopy full SHA for af8ac2f
modules/exploits/unix/webapp/invision_pboard_unserialize_exec.rb
@@ -29,7 +29,7 @@ def initialize(info = {})
29
30
The exploit has been tested successfully on Invision IP.Board 3.3.4.
31
},
32
- 'Author' =>
+ 'Author' =>
33
[
34
'EgiX', # Vulnerability discovery and PoC
35
'juan vazquez', # Metasploit module
@@ -74,6 +74,7 @@ def check
74
return Exploit::CheckCode::Unknown if not res
75
76
version = res.body.scan(/Community Forum Software by IP\.Board (\d+)\.(\d+).(\d+)/).flatten
77
+ return Exploit::CheckCode::Safe if version.empty?
78
version = version.map {|e| e.to_i}
79
80
# We only want major version 3
0 commit comments