Land #5181, Revert unwanted URI encoding

bug/bundler_fix
Christian Mehlmauer 2015-04-18 11:55:19 +02:00
commit 3417c3f5ab
No known key found for this signature in database
GPG Key ID: BCFF4FA966BC32C7
21 changed files with 25 additions and 1 deletions

View File

@ -81,6 +81,7 @@ class Metasploit4 < Msf::Auxiliary
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
},
'encode_params' => false,
'vars_get' => {
'sap-client' => datastore['CLIENT'],
'sap-language' => 'EN'

View File

@ -123,6 +123,7 @@ class Metasploit4 < Msf::Auxiliary
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{client}",
'ctype' => 'text/xml; charset=UTF-8',
'authorization' => basic_auth(username, password),
'encode_params' => false,
'headers' =>
{
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',

View File

@ -102,6 +102,7 @@ class Metasploit4 < Msf::Auxiliary
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
},
'encode_params' => false,
'vars_get' => {
'sap-client' => datastore['CLIENT'],
'sap-language' => 'EN'

View File

@ -103,6 +103,7 @@ class Metasploit4 < Msf::Auxiliary
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
},
'encode_params' => false,
'vars_get' => {
'sap-client' => datastore['CLIENT'],
'sap-language' => 'EN'

View File

@ -71,6 +71,7 @@ class Metasploit4 < Msf::Auxiliary
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions'
},
'encode_params' => false,
'vars_get' => {
'sap-client' => client,
'sap-language' => 'EN'

View File

@ -89,6 +89,7 @@ class Metasploit4 < Msf::Auxiliary
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
},

View File

@ -75,6 +75,7 @@ class Metasploit4 < Msf::Auxiliary
'data' => data,
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions'

View File

@ -78,6 +78,7 @@ class Metasploit4 < Msf::Auxiliary
'data' => data,
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',

View File

@ -78,6 +78,7 @@ class Metasploit4 < Msf::Auxiliary
'data' => data,
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'headers' =>{
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',

View File

@ -94,6 +94,7 @@ class Metasploit4 < Msf::Auxiliary
'data' => data,
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'headers' =>{
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',

View File

@ -69,6 +69,7 @@ class Metasploit4 < Msf::Auxiliary
'data' => data,
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
'ctype' => 'text/xml; charset=UTF-8',
'encode_params' => false,
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'headers' => {
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',

View File

@ -105,6 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
res = send_request_cgi({
'uri' => '/admin/system.html',
'cookie' => "usercookie=#{user}; passcookie=#{pass};",
'encode_params' => false,
'vars_get' => {
'step' => '2',
'device' => "lo#{cmd}"

View File

@ -102,6 +102,7 @@ class Metasploit3 < Msf::Exploit::Remote
login = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/index.php'),
'method' => 'POST',
'encode_params' => false,
'vars_post' => post,
'vars_get' => {
'c' => 'login',

View File

@ -97,6 +97,7 @@ class Metasploit3 < Msf::Exploit::Remote
res = send_request_cgi({
'uri' => '/index.cgi',
'authorization' => basic_auth(user, pass),
'encode_params' => false,
'vars_get' => {
'nlines' => lines,
'action' => 'See logs',

View File

@ -66,6 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
'uri' => normalize_uri(@uri.path, 'j_spring_security_check'),
'method' => 'POST',
'cookie' => @cookie,
'encode_params' => false,
'vars_post' => {
'j_username' => Rex::Text.uri_encode(user, 'hex-normal'),
'j_password' => Rex::Text.uri_encode(pass, 'hex-normal'),
@ -86,6 +87,7 @@ class Metasploit3 < Msf::Exploit::Remote
res = send_request_cgi({
'uri' => normalize_uri(@uri.path, 'mastheadAttach.do'),
'cookie' => @cookie,
'encode_params' => false,
'vars_get' => {
'typeId' => '10003'
}
@ -144,6 +146,7 @@ class Metasploit3 < Msf::Exploit::Remote
'method' => 'POST',
'uri' => normalize_uri(@uri.path, 'hqu/gconsole/console/execute.hqu?org.apache.catalina.filters.CSRF_NONCE=')+@nonce,
'cookie' => @cookie,
'encode_params' => false,
'vars_post' => {
'code' => java # java_craft_runtime_exec(cmd)
}

View File

@ -184,6 +184,7 @@ class Metasploit3 < Msf::Exploit::Remote
'uri' => normalize_uri(base, 'setup/setup-/../../plugin-admin.jsp'),
'method' => 'POST',
'data' => data,
'encode_params' => false,
'headers' => {
'Content-Type' => 'multipart/form-data; boundary=' + boundary,
'Content-Length' => data.length,
@ -202,6 +203,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("Deleting plugin #{plugin_name} from the server")
res = send_request_cgi({
'uri' => normalize_uri(base, 'setup/setup-/../../plugin-admin.jsp'),
'encode_params' => false,
'headers' => {
'Cookie' => "JSESSIONID=#{rand_text_numeric(13)}",
},

View File

@ -71,6 +71,7 @@ class Metasploit3 < Msf::Exploit::Remote
'uri' => '/robohelp/server',
'version' => '1.1',
'method' => 'POST',
'encode_params' => false,
'data' => file,
'headers' => {
'Content-Type' => 'multipart/form-data; boundary=---------------------------' + uid,

View File

@ -54,6 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
'method' => 'POST',
'data' => contents,
'ctype' => 'text/html',
'encode_params' => false,
'vars_get' => {
'computerName' => 'DesktopCentral',
'domainName' => 'webapps',

View File

@ -85,6 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
send_request_cgi({
'uri' => '/OvCgi/ovalarm.exe',
'method' => "GET",
'encode_params' => false,
'headers' => {
'Accept-Language' => sploit
},

View File

@ -70,6 +70,7 @@ class Metasploit3 < Msf::Exploit::Remote
res = send_request_cgi({
'uri' => normalize_uri(datastore['DIR'], 'Login.jsp'),
'method' => 'GET',
'encode_params' => false,
'headers' => {
'Accept' => '*/*',
},

View File

@ -73,6 +73,7 @@ class Metasploit3 < Msf::Exploit::Remote
'headers' => {
'Content-Type' => 'application/octet-stream',
},
'encode_params' => false,
'vars_get' => {
'filename' => "../../webapps/#{app_base}.war"
}
@ -82,7 +83,7 @@ class Metasploit3 < Msf::Exploit::Remote
select(nil, nil, nil, 20)
if (res.code == 200)
if (res && res.code == 200)
print_status("Triggering payload at '/#{app_base}/#{jsp_name}.jsp' ...")
send_request_raw(
{