metadata formatting, and a little res gotcha

unstable
sinn3r 2012-10-08 15:00:51 -05:00
parent cdf8956a10
commit abb4bdd408
1 changed files with 7 additions and 6 deletions

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize
super(
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
'Description' => %q{
This module exploits an authentication bypass vulnerability on Avaya IP Office
Customer Call Reporter, which allows a remote user to upload arbitrary files
@ -24,10 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
},
'Author' => [
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
'Author' =>
[
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
'Platform' => 'win',
'References' =>
[
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
'method' => 'GET'
}, 20)
if (!res or res.code != 200)
if (!res or (res and res.code != 200))
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
return
end