From ff30a272f359775a582d780bbaf026f37d2c54be Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Sun, 30 Nov 2014 18:54:41 -0600 Subject: [PATCH] Windows paths need 2 backslashes --- modules/auxiliary/admin/http/netflow_file_download.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/auxiliary/admin/http/netflow_file_download.rb b/modules/auxiliary/admin/http/netflow_file_download.rb index 085b9cd379..65eb166a8c 100644 --- a/modules/auxiliary/admin/http/netflow_file_download.rb +++ b/modules/auxiliary/admin/http/netflow_file_download.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ This module exploits an arbitrary file download vulnerability in CSVServlet on ManageEngine NetFlow Analyzer. This module has been tested on both Windows - and Linux with versions 8.6 to 10.2. Windows paths have to be escaped with 4 + and Linux with versions 8.6 to 10.2. Windows paths have to be escaped with 2 backslashes on the command line. }, 'Author' => @@ -38,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary Opt::RPORT(8080), OptString.new('TARGETURI', [ true, "The base path to NetFlow Analyzer", '/netflow' ]), - OptString.new('FILEPATH', [true, 'Path of the file to download (escape Windows paths with 4 back slashes)', '/etc/passwd']), + OptString.new('FILEPATH', [true, 'Path of the file to download (escape Windows paths with 2 back slashes)', '/etc/passwd']), ], self.class) end