Autofilter based on existence of the softcart cgi

git-svn-id: file:///home/svn/framework3/trunk@7297 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-10-28 18:02:37 +00:00
parent aa09862813
commit a41b1db7de
1 changed files with 8 additions and 0 deletions

View File

@ -69,6 +69,14 @@ class Metasploit3 < Msf::Exploit::Remote
OptString.new('URI', [ false, "The target CGI URI", '/cgi-bin/SoftCart.exe' ])
], self.class)
end
# Make sure the CGI exists before trying to exploit it
def autofilter
res = send_request_raw({
'uri' => datastore['URI']
}, 5)
(res and res.body and res.body =~ /Copyright.*Mercantec/)
end
def brute_exploit(address)