We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fc5be2d commit bd646deCopy full SHA for bd646de
modules/exploits/multi/http/rails_dynamic_render_code_exec.rb
@@ -73,7 +73,7 @@ def check
73
74
# if the page controller is dynamically rendering, its for sure vuln
75
if res and res.body =~ /render params/
76
- return Exploit::CheckCode::Vulnerable
+ return CheckCode::Vulnerable
77
end
78
79
# this is the check for the prod environment
@@ -82,11 +82,11 @@ def check
82
'method' => 'GET',
83
}, 60)
84
85
- # maybe its exploitable
+ # if we can read files, its likley we can execute code
86
if res and res.body =~ /ruby/
87
- return Exploit::CheckCode::Appears
+ return CheckCode::Appears
88
89
- return Exploit::CheckCode::Safe
+ return CheckCode::Safe
90
91
92
def on_request_uri(cli, request)
0 commit comments