Better regex and email format correction
parent
2939e3918e
commit
d67234bd03
|
@ -24,11 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Brendan Coles <bcoles[at]gmail[dot]com>', # Discovery and exploit
|
||||
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/'],
|
||||
['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/']
|
||||
#['OSVDB', ''],
|
||||
#['EDB', ''],
|
||||
],
|
||||
|
@ -65,9 +65,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'uri' => "#{base}"
|
||||
})
|
||||
|
||||
if res.body =~ /<strong style="font-size:8pt;font-weight:normal">Version 2.11.2<\/strong><br>/
|
||||
if res.body =~ /\<strong style\=\"font\-size\:8pt\;font\-weight\:normal\"\>Version 2\.11\.2\<\/strong\>\<br\>/
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
elsif res.body =~ /<a href="http:\/\/cuteflow\.org" target="_blank">/
|
||||
elsif res.body =~ /\<a href\=\"http\:\/\/cuteflow\.org" target\=\"\_blank\"\>/
|
||||
return Exploit::CheckCode::Detected
|
||||
else
|
||||
return Exploit::CheckCode::Safe
|
||||
|
|
Loading…
Reference in New Issue