File tree Expand file tree Collapse file tree 1 file changed +7
-3
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +7
-3
lines changed Original file line number Diff line number Diff line change @@ -77,11 +77,15 @@ def check
77
77
78
78
print_status ( "SPIP Version detected: #{ rversion } " )
79
79
80
- if rversion > Rex ::Version . new ( '4.2.12 ' )
80
+ if rversion >= Rex ::Version . new ( '4.3.0-alpha2 ' )
81
81
return CheckCode ::Safe ( "The detected SPIP version (#{ rversion } ) is not vulnerable." )
82
+ elsif rversion . between? ( Rex ::Version . new ( '4.2.0' ) , Rex ::Version . new ( '4.2.12' ) )
83
+ return Exploit ::CheckCode ::Appears ( "The detected SPIP version (#{ rversion } ) is vulnerable." )
84
+ elsif rversion . between? ( Rex ::Version . new ( '4.1.0' ) , Rex ::Version . new ( '4.1.15' ) )
85
+ return Exploit ::CheckCode ::Appears ( "The detected SPIP version (#{ rversion } ) is vulnerable." )
86
+ elsif rversion < Rex ::Version . new ( '4.1.0' )
87
+ return Exploit ::CheckCode ::Appears ( "The detected SPIP version (#{ rversion } ) is vulnerable." )
82
88
end
83
-
84
- return CheckCode ::Appears ( "The detected SPIP version (#{ rversion } ) is vulnerable." )
85
89
end
86
90
87
91
def php_exec_cmd ( encoded_payload )
You can’t perform that action at this time.
0 commit comments