File tree Expand file tree Collapse file tree 1 file changed +2
-3
lines changed
modules/exploits/unix/webapp Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -19,8 +19,7 @@ def initialize(info = {})
19
19
The Wordpress SlideShow Gallery plugin contains an authenticated file upload
20
20
vulnerability. We can upload arbitrary files to the upload folder, because
21
21
the plugin also uses it's own file upload mechanism instead of the wordpress
22
- api it's possible to upload any file type. The user provided does not need
23
- special rights, and users with "Contributor" role can be abused.
22
+ api it's possible to upload any file type.
24
23
} ,
25
24
'Author' =>
26
25
[
@@ -103,7 +102,7 @@ def exploit
103
102
if res . code == 200
104
103
register_files_for_cleanup ( filename )
105
104
else
106
- fail_with ( Failure ::Unknown , "#{ peer } - Unable to deploy payload, server returned #{ res . code } " )
105
+ fail_with ( Failure ::Unknown , "#{ peer } - You do not have sufficient permissions to access this page. " )
107
106
end
108
107
else
109
108
fail_with ( Failure ::Unknown , 'Server did not respond in an expected way' )
You can’t perform that action at this time.
0 commit comments