fixed the check function
This commit is contained in:
@@ -73,7 +73,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
|
||||
# if the page controller is dynamically rendering, its for sure vuln
|
||||
if res and res.body =~ /render params/
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
return CheckCode::Vulnerable
|
||||
end
|
||||
|
||||
# this is the check for the prod environment
|
||||
@@ -82,11 +82,11 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'method' => 'GET',
|
||||
}, 60)
|
||||
|
||||
# maybe its exploitable
|
||||
# if we can read files, its likley we can execute code
|
||||
if res and res.body =~ /ruby/
|
||||
return Exploit::CheckCode::Appears
|
||||
return CheckCode::Appears
|
||||
end
|
||||
return Exploit::CheckCode::Safe
|
||||
return CheckCode::Safe
|
||||
end
|
||||
|
||||
def on_request_uri(cli, request)
|
||||
|
||||
Reference in New Issue
Block a user