get rid of some more ^Ms
git-svn-id: file:///home/svn/framework3/trunk@7880 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
48c3709a25
commit
2570fcee15
|
@ -22,6 +22,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
include Msf::Exploit::Remote::BrowserAutopwn
|
include Msf::Exploit::Remote::BrowserAutopwn
|
||||||
autopwn_info({
|
autopwn_info({
|
||||||
:ua_name => HttpClients::IE,
|
:ua_name => HttpClients::IE,
|
||||||
|
# In badly misconfigured situations, IE7 and 8 could be vulnerable to
|
||||||
|
# this, but by default they throw an ugly popup that stops all script
|
||||||
|
# execution until the user deals with it and aborts everything if they
|
||||||
|
# click "no". Not worth the risk of being unable to try more recent
|
||||||
|
# exploits.
|
||||||
|
:ua_maxver => "6.0",
|
||||||
:javascript => true,
|
:javascript => true,
|
||||||
:os_name => OperatingSystems::WINDOWS,
|
:os_name => OperatingSystems::WINDOWS,
|
||||||
:vuln_test => 'CreateObject',
|
:vuln_test => 'CreateObject',
|
||||||
|
@ -41,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'{0006F033-0000-0000-C000-000000000046}',
|
'{0006F033-0000-0000-C000-000000000046}',
|
||||||
'{0006F03A-0000-0000-C000-000000000046}',
|
'{0006F03A-0000-0000-C000-000000000046}',
|
||||||
],
|
],
|
||||||
:rank => ExcellentRanking # reliable exe writer
|
#:rank => ExcellentRanking # reliable exe writer
|
||||||
})
|
})
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
|
|
Loading…
Reference in New Issue