Land #5181, Revert unwanted URI encoding
commit
3417c3f5ab
|
@ -81,6 +81,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
},
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'sap-client' => datastore['CLIENT'],
|
||||
'sap-language' => 'EN'
|
||||
|
|
|
@ -123,6 +123,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{client}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'authorization' => basic_auth(username, password),
|
||||
'encode_params' => false,
|
||||
'headers' =>
|
||||
{
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
|
|
|
@ -102,6 +102,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
},
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'sap-client' => datastore['CLIENT'],
|
||||
'sap-language' => 'EN'
|
||||
|
|
|
@ -103,6 +103,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
},
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'sap-client' => datastore['CLIENT'],
|
||||
'sap-language' => 'EN'
|
||||
|
|
|
@ -71,6 +71,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions'
|
||||
},
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'sap-client' => client,
|
||||
'sap-language' => 'EN'
|
||||
|
|
|
@ -89,6 +89,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
},
|
||||
|
|
|
@ -75,6 +75,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'data' => data,
|
||||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions'
|
||||
|
|
|
@ -78,6 +78,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'data' => data,
|
||||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
|
|
|
@ -78,6 +78,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'data' => data,
|
||||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'headers' =>{
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
|
|
|
@ -94,6 +94,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'data' => data,
|
||||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'headers' =>{
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
|
|
|
@ -69,6 +69,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'data' => data,
|
||||
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'encode_params' => false,
|
||||
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
|
||||
'headers' => {
|
||||
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||
|
|
|
@ -105,6 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'uri' => '/admin/system.html',
|
||||
'cookie' => "usercookie=#{user}; passcookie=#{pass};",
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'step' => '2',
|
||||
'device' => "lo#{cmd}"
|
||||
|
|
|
@ -102,6 +102,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
login = send_request_cgi({
|
||||
'uri' => normalize_uri(target_uri.path, '/index.php'),
|
||||
'method' => 'POST',
|
||||
'encode_params' => false,
|
||||
'vars_post' => post,
|
||||
'vars_get' => {
|
||||
'c' => 'login',
|
||||
|
|
|
@ -97,6 +97,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'uri' => '/index.cgi',
|
||||
'authorization' => basic_auth(user, pass),
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'nlines' => lines,
|
||||
'action' => 'See logs',
|
||||
|
|
|
@ -66,6 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'uri' => normalize_uri(@uri.path, 'j_spring_security_check'),
|
||||
'method' => 'POST',
|
||||
'cookie' => @cookie,
|
||||
'encode_params' => false,
|
||||
'vars_post' => {
|
||||
'j_username' => Rex::Text.uri_encode(user, 'hex-normal'),
|
||||
'j_password' => Rex::Text.uri_encode(pass, 'hex-normal'),
|
||||
|
@ -86,6 +87,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'uri' => normalize_uri(@uri.path, 'mastheadAttach.do'),
|
||||
'cookie' => @cookie,
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'typeId' => '10003'
|
||||
}
|
||||
|
@ -144,6 +146,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'method' => 'POST',
|
||||
'uri' => normalize_uri(@uri.path, 'hqu/gconsole/console/execute.hqu?org.apache.catalina.filters.CSRF_NONCE=')+@nonce,
|
||||
'cookie' => @cookie,
|
||||
'encode_params' => false,
|
||||
'vars_post' => {
|
||||
'code' => java # java_craft_runtime_exec(cmd)
|
||||
}
|
||||
|
|
|
@ -184,6 +184,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'uri' => normalize_uri(base, 'setup/setup-/../../plugin-admin.jsp'),
|
||||
'method' => 'POST',
|
||||
'data' => data,
|
||||
'encode_params' => false,
|
||||
'headers' => {
|
||||
'Content-Type' => 'multipart/form-data; boundary=' + boundary,
|
||||
'Content-Length' => data.length,
|
||||
|
@ -202,6 +203,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
print_status("Deleting plugin #{plugin_name} from the server")
|
||||
res = send_request_cgi({
|
||||
'uri' => normalize_uri(base, 'setup/setup-/../../plugin-admin.jsp'),
|
||||
'encode_params' => false,
|
||||
'headers' => {
|
||||
'Cookie' => "JSESSIONID=#{rand_text_numeric(13)}",
|
||||
},
|
||||
|
|
|
@ -71,6 +71,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'uri' => '/robohelp/server',
|
||||
'version' => '1.1',
|
||||
'method' => 'POST',
|
||||
'encode_params' => false,
|
||||
'data' => file,
|
||||
'headers' => {
|
||||
'Content-Type' => 'multipart/form-data; boundary=---------------------------' + uid,
|
||||
|
|
|
@ -54,6 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'method' => 'POST',
|
||||
'data' => contents,
|
||||
'ctype' => 'text/html',
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'computerName' => 'DesktopCentral',
|
||||
'domainName' => 'webapps',
|
||||
|
|
|
@ -85,6 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_request_cgi({
|
||||
'uri' => '/OvCgi/ovalarm.exe',
|
||||
'method' => "GET",
|
||||
'encode_params' => false,
|
||||
'headers' => {
|
||||
'Accept-Language' => sploit
|
||||
},
|
||||
|
|
|
@ -70,6 +70,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'uri' => normalize_uri(datastore['DIR'], 'Login.jsp'),
|
||||
'method' => 'GET',
|
||||
'encode_params' => false,
|
||||
'headers' => {
|
||||
'Accept' => '*/*',
|
||||
},
|
||||
|
|
|
@ -73,6 +73,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'headers' => {
|
||||
'Content-Type' => 'application/octet-stream',
|
||||
},
|
||||
'encode_params' => false,
|
||||
'vars_get' => {
|
||||
'filename' => "../../webapps/#{app_base}.war"
|
||||
}
|
||||
|
@ -82,7 +83,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
select(nil, nil, nil, 20)
|
||||
|
||||
if (res.code == 200)
|
||||
if (res && res.code == 200)
|
||||
print_status("Triggering payload at '/#{app_base}/#{jsp_name}.jsp' ...")
|
||||
send_request_raw(
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue