diff --git a/data/js/network/ajax_post.js b/data/js/network/ajax_post.js index f3a0175c28..91f6b47a1a 100644 --- a/data/js/network/ajax_post.js +++ b/data/js/network/ajax_post.js @@ -14,4 +14,5 @@ function postInfo(path, data, cb) { } xmlHttp.send(data); + return xmlHttp; } diff --git a/lib/msf/core/exploit/remote/browser_exploit_server.rb b/lib/msf/core/exploit/remote/browser_exploit_server.rb index 541665dfe5..994355b5a9 100644 --- a/lib/msf/core/exploit/remote/browser_exploit_server.rb +++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb @@ -291,8 +291,8 @@ module Msf # def process_browser_info(source, cli, request) tag = retrieve_tag(cli, request) - target_info = get_profile(tag) init_profile(tag) + target_info = get_profile(tag) update_profile(target_info, :source, source.to_s) # Gathering target info from the detection stage @@ -300,7 +300,7 @@ module Msf when :script # Gathers target data from a POST request parsed_body = CGI::parse(Rex::Text.decode_base64(request.body) || '') - vprint_status("Received sniffed browser data over POST: \n#{parsed_body}.") + vprint_debug("Received sniffed browser data over POST: \n#{parsed_body}.") parsed_body.each { |k, v| update_profile(target_info, k.to_sym, v.first) } when :headers # Gathers target data from headers