Fixes #2974. Adds an "Unknown" level to Exploit::CheckCode, fixes the URI check for exploit/unix/webapp/php_include (which was relying on Unknown).
git-svn-id: file:///home/svn/framework3/trunk@10694 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
70774ba7cf
commit
865b711b5c
|
@ -52,6 +52,11 @@ class Exploit < Msf::Module
|
|||
##
|
||||
module CheckCode
|
||||
|
||||
#
|
||||
# Can't tell if the target is exploitable or not.
|
||||
#
|
||||
Unknown = [-1, "Cannot reliably check exploitability."]
|
||||
|
||||
#
|
||||
# The target is safe and is therefore not exploitable.
|
||||
#
|
||||
|
|
|
@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def check
|
||||
uri = datastore['PHPURI'].dup
|
||||
uri = datastore['PHPURI'] ? datastore['PHPURI'].dup : ""
|
||||
if(uri and ! uri.empty?)
|
||||
uri.gsub!(/\?.*/, "")
|
||||
print_status("Checking uri #{uri}")
|
||||
|
|
Loading…
Reference in New Issue