Fixes #2974. Adds an "Unknown" level to Exploit::CheckCode, fixes the URI check for exploit/unix/webapp/php_include (which was relying on Unknown).

git-svn-id: file:///home/svn/framework3/trunk@10694 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Tod Beardsley 2010-10-15 12:24:17 +00:00
parent 70774ba7cf
commit 865b711b5c
2 changed files with 6 additions and 1 deletions

View File

@ -52,6 +52,11 @@ class Exploit < Msf::Module
##
module CheckCode
#
# Can't tell if the target is exploitable or not.
#
Unknown = [-1, "Cannot reliably check exploitability."]
#
# The target is safe and is therefore not exploitable.
#

View File

@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def check
uri = datastore['PHPURI'].dup
uri = datastore['PHPURI'] ? datastore['PHPURI'].dup : ""
if(uri and ! uri.empty?)
uri.gsub!(/\?.*/, "")
print_status("Checking uri #{uri}")