From 0dbfecba36ea218b5612b001f2fbe23c6c122865 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Fri, 7 Nov 2014 02:23:34 -0600 Subject: [PATCH] Better method name Should be srvhost, not lhost --- modules/exploits/windows/browser/msvidctl_mpeg2.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/browser/msvidctl_mpeg2.rb b/modules/exploits/windows/browser/msvidctl_mpeg2.rb index 3fb75e7d5b..70582071df 100644 --- a/modules/exploits/windows/browser/msvidctl_mpeg2.rb +++ b/modules/exploits/windows/browser/msvidctl_mpeg2.rb @@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote @javascript_encode_key = rand_text_alpha(rand(10) + 10) end - def get_lhost + def get_srvhost # If the SRVHOST isn't the default 0.0.0.0, obviously the user wants to # specify, so we will not force source_address() return datastore['SRVHOST'] if datastore['SRVHOST'] != '0.0.0.0' @@ -194,7 +194,7 @@ class Metasploit3 < Msf::Exploit::Remote j_memory = rand_text_alpha(rand(100) + 1) j_counter = rand_text_alpha(rand(30) + 2) - host = get_lhost + ":" + (datastore["SRVPORT"].to_s) + host = get_srvhost + ":" + (datastore["SRVPORT"].to_s) gif_uri = "http#{(datastore['SSL'] ? 's' : '')}://#{host}" if ("/" == get_resource[-1,1]) gif_uri << get_resource[0, get_resource.length - 1]