Skip to content

Commit f6bac3a

Browse files
committed
Add iso link to md file and change CheckCode code
1 parent e5636d6 commit f6bac3a

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

documentation/modules/exploit/linux/http/logsign_exec.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22

33
Download the vulnerable version of OVA or ISO file from following URL. I strongly suggest you to choose OVA.
44

5+
[http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova](http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova)
6+
57
### Creating A Testing Environment
68

79
1. Open OVA file with your preferred virtualisation application.
@@ -59,7 +61,7 @@ dns-nameservers 8.8.8.8
5961
8. `check` and validate that you are seeing following output.
6062

6163
```
62-
[*] 12.0.0.10:80 The target appears to be vulnerable.
64+
[+] 12.0.0.10:80 The target is vulnerable.
6365
```
6466

6567
9. Here you go. Type `exploit` and hit the enter.

modules/exploits/linux/http/logsign_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ def check
5656
)
5757

5858
if res && res.body.include?('{"message": "success", "success": true}')
59-
Exploit::CheckCode::Appears
59+
Exploit::CheckCode::Vulnerable
6060
else
6161
Exploit::CheckCode::Safe
6262
end

0 commit comments

Comments
 (0)