Skip to content

Commit c1a1143

Browse files
committed
Remove line in description and output line in fail_with
1 parent 2138325 commit c1a1143

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

modules/exploits/unix/webapp/wp_slideshowgallery_upload.rb

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,7 @@ def initialize(info = {})
1919
The Wordpress SlideShow Gallery plugin contains an authenticated file upload
2020
vulnerability. We can upload arbitrary files to the upload folder, because
2121
the plugin also uses it's own file upload mechanism instead of the wordpress
22-
api it's possible to upload any file type. The user provided does not need
23-
special rights, and users with "Contributor" role can be abused.
22+
api it's possible to upload any file type.
2423
},
2524
'Author' =>
2625
[
@@ -103,7 +102,7 @@ def exploit
103102
if res.code == 200
104103
register_files_for_cleanup(filename)
105104
else
106-
fail_with(Failure::Unknown, "#{peer} - Unable to deploy payload, server returned #{res.code}")
105+
fail_with(Failure::Unknown, "#{peer} - You do not have sufficient permissions to access this page.")
107106
end
108107
else
109108
fail_with(Failure::Unknown, 'Server did not respond in an expected way')

0 commit comments

Comments
 (0)