Fix scrutinizer checks
parent
5332e80ae9
commit
1a01d6d033
|
@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
|
||||
def check
|
||||
res = send_request_raw({'uri'=>normalize_uri(target_uri.path)})
|
||||
res = send_request_raw({'uri'=>'/'}) # Check the base path for version regex
|
||||
if res and res.body =~ /\<title\>Scrutinizer\<\/title\>/ and
|
||||
res.body =~ /\<div id\=\'.+\'\>Scrutinizer 9\.[0-5]\.[0-1]\<\/div\>/
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
|
|
|
@ -72,10 +72,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def check
|
||||
tmp_rport = datastore['RPORT']
|
||||
uri = normalize_uri(target_uri.path)
|
||||
uri << '/' if uri[-1,1] != '/'
|
||||
datastore['RPORT'] = datastore['HTTPPORT']
|
||||
res = send_request_raw({'uri'=>uri})
|
||||
res = send_request_raw({'uri'=>'/'}) #Check the base path for regex
|
||||
datastore['RPORT'] = tmp_rport
|
||||
if res and res.body =~ /\<title\>Scrutinizer\<\/title\>/ and
|
||||
res.body =~ /\<div id\=\'.+\'\>Scrutinizer 9\.[0-5]\.[0-2]\<\/div\>/
|
||||
|
|
Loading…
Reference in New Issue