Rewrote check code.

bug/bundler_fix
Roberto Soares 2015-04-16 04:51:40 -03:00
parent d3a6de761d
commit 81d898fd7e
1 changed files with 1 additions and 9 deletions

View File

@ -39,15 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def check
res = send_request_cgi(
'uri' => normalize_uri(wordpress_url_plugins, 'website-contact-form-with-file-upload', 'readme.txt')
)
if res && res.code == 200 && res.body =~ /N-Media Website Contact Form/
return Exploit::CheckCode::Detected
end
Exploit::CheckCode::Safe
check_plugin_version_from_readme('website-contact-form-with-file-upload', '1.3.4')
end
def exploit