Don't puke if the connection came from localhost
parent
afe28523f3
commit
a2dc890cfa
|
@ -922,19 +922,30 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
note_data[:arch] = arch if arch != "undefined"
|
note_data[:arch] = arch if arch != "undefined"
|
||||||
print_status("#{cli.peerhost.ljust 16} Reporting: #{note_data.inspect}")
|
print_status("#{cli.peerhost.ljust 16} Reporting: #{note_data.inspect}")
|
||||||
|
|
||||||
|
# Reporting stuff isn't really essential since we store all
|
||||||
|
# the target information locally. Make sure any exception
|
||||||
|
# raised from the report_* methods doesn't prevent us from
|
||||||
|
# sending exploits. This is really only an issue for
|
||||||
|
# connections from localhost where we end up with
|
||||||
|
# ActiveRecord::RecordInvalid errors because 127.0.0.1 is
|
||||||
|
# blacklisted in the Host validations.
|
||||||
|
begin
|
||||||
report_note({
|
report_note({
|
||||||
:host => cli.peerhost,
|
:host => cli.peerhost,
|
||||||
:type => 'javascript_fingerprint',
|
:type => 'javascript_fingerprint',
|
||||||
:data => note_data,
|
:data => note_data,
|
||||||
:update => :unique_data,
|
:update => :unique_data,
|
||||||
})
|
})
|
||||||
client_info = ({
|
client_info = {
|
||||||
:host => cli.peerhost,
|
:host => cli.peerhost,
|
||||||
:ua_string => request['User-Agent'],
|
:ua_string => request['User-Agent'],
|
||||||
:ua_name => ua_name,
|
:ua_name => ua_name,
|
||||||
:ua_ver => ua_ver
|
:ua_ver => ua_ver
|
||||||
})
|
}
|
||||||
report_client(client_info)
|
report_client(client_info)
|
||||||
|
rescue => e
|
||||||
|
elog("Reporting failed: #{e.class} : #{e.message}")
|
||||||
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue