This check can be handy
parent
5fd58eda71
commit
b527356e00
|
@ -62,6 +62,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
def check
|
||||
res = send_request_raw({'uri'=>'/'})
|
||||
if res and res.headers['Server'] =~ /PMSoftware\-SWS\/2\.[0-2]/
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
end
|
||||
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
||||
sploit = payload.encoded
|
||||
|
|
Loading…
Reference in New Issue