From bd646ded1bb140caef227ebab3bfa6d110b05d68 Mon Sep 17 00:00:00 2001 From: mr_me Date: Tue, 11 Oct 2016 14:06:03 -0500 Subject: [PATCH] fixed the check function --- .../exploits/multi/http/rails_dynamic_render_code_exec.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb b/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb index 328a900ac0..b9c1bedb10 100644 --- a/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb +++ b/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb @@ -73,7 +73,7 @@ class MetasploitModule < Msf::Exploit::Remote # if the page controller is dynamically rendering, its for sure vuln if res and res.body =~ /render params/ - return Exploit::CheckCode::Vulnerable + return CheckCode::Vulnerable end # this is the check for the prod environment @@ -82,11 +82,11 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET', }, 60) - # maybe its exploitable + # if we can read files, its likley we can execute code if res and res.body =~ /ruby/ - return Exploit::CheckCode::Appears + return CheckCode::Appears end - return Exploit::CheckCode::Safe + return CheckCode::Safe end def on_request_uri(cli, request)