Orientdb 2.2.x RCE - Fix regular expression for version detection
parent
30664924c8
commit
4845b4b1fa
|
@ -52,7 +52,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
uri = target_uri
|
uri = target_uri
|
||||||
uri.path = normalize_uri(uri.path)
|
uri.path = normalize_uri(uri.path)
|
||||||
res = send_request_raw({'uri' => "#{uri.path}listDatabases"})
|
res = send_request_raw({'uri' => "#{uri.path}listDatabases"})
|
||||||
if res and res.code == 200 and res.headers['Server'] =~ /OrientDB Server v\.2\.2\.[2-9]|1[0-9]|2[0-2]/
|
if res and res.code == 200 and res.headers['Server'] =~ /OrientDB Server v\.2\.2\./
|
||||||
print_good("Version: #{res.headers['Server']}")
|
print_good("Version: #{res.headers['Server']}")
|
||||||
return Exploit::CheckCode::Vulnerable
|
return Exploit::CheckCode::Vulnerable
|
||||||
else
|
else
|
||||||
|
|
Loading…
Reference in New Issue