From d11db4edc7028b123a3922fbefffcbfe4311a2a9 Mon Sep 17 00:00:00 2001 From: Roberto Soares Date: Thu, 16 Apr 2015 04:37:30 -0300 Subject: [PATCH] Rewrote check code. --- .../unix/webapp/wp_creativecontactform_file_upload.rb | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb b/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb index 54ef172435..ce0daf2de4 100644 --- a/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb +++ b/modules/exploits/unix/webapp/wp_creativecontactform_file_upload.rb @@ -40,15 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote end def check - res = send_request_cgi( - 'uri' => normalize_uri(wordpress_url_plugins, 'sexy-contact-form', 'includes', 'fileupload', 'index.php') - ) - - if res && res.code == 200 && res.body =~ /files/ - return Exploit::CheckCode::Detected - end - - Exploit::CheckCode::Safe + check_plugin_version_from_readme('sexy-contact-form', '0.9.7') end def exploit