diff --git a/lib/msf/ui/console/driver.rb b/lib/msf/ui/console/driver.rb index 5064339f7e..4847eb9e50 100644 --- a/lib/msf/ui/console/driver.rb +++ b/lib/msf/ui/console/driver.rb @@ -295,19 +295,23 @@ protected # executable. This is only allowed if command passthru has been permitted # def unknown_command(method, line) - if (command_passthru == true and Rex::FileUtils.find_full_path(method)) - - print_status("Executing: `#{line}`") - print_line('') - - io = ::IO.popen(line, "r") - io.each_line do |data| - print(data) + + [method, method+".exe"].each do |cmd| + if (command_passthru == true and Rex::FileUtils.find_full_path(cmd)) + + print_status("exec: #{line}") + print_line('') + + io = ::IO.popen(line, "r") + io.each_line do |data| + print(data) + end + io.close + return end - io.close - else - super end + + super end ## diff --git a/lib/msf/ui/gtk2.rb b/lib/msf/ui/gtk2.rb index 1d5a819b47..a59c5e9c4f 100644 --- a/lib/msf/ui/gtk2.rb +++ b/lib/msf/ui/gtk2.rb @@ -20,7 +20,7 @@ module Msf ] LIST = 'framework-subscribe@metasploit.com' BUGREPORT_URL = 'http://metasploit.com/dev/trac/report/9' - WEBSITE_URL = 'http://www.metasploit3.com' + WEBSITE_URL = 'http://metasploit3.com' VERSION = "v#{Msf::Framework::Version}" # diff --git a/lib/msf/ui/gtk2/about.rb b/lib/msf/ui/gtk2/about.rb index af7127b03a..4f7ecb3650 100644 --- a/lib/msf/ui/gtk2/about.rb +++ b/lib/msf/ui/gtk2/about.rb @@ -12,7 +12,7 @@ module Msf include Msf::Ui::Gtk2::MyControls Gtk::AboutDialog.set_email_hook do |about, link| - Rex::Compat.open_browser("mailto:#{link}") + Rex::Compat.open_email(link) end Gtk::AboutDialog.set_url_hook do |about, link|