Rewrote check code.

bug/bundler_fix
Roberto Soares 2015-04-16 04:37:30 -03:00
parent f13d31c7c2
commit d11db4edc7
1 changed files with 1 additions and 9 deletions

View File

@ -40,15 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def check
res = send_request_cgi(
'uri' => normalize_uri(wordpress_url_plugins, 'sexy-contact-form', 'includes', 'fileupload', 'index.php')
)
if res && res.code == 200 && res.body =~ /files/
return Exploit::CheckCode::Detected
end
Exploit::CheckCode::Safe
check_plugin_version_from_readme('sexy-contact-form', '0.9.7')
end
def exploit