Don't puke if the connection came from localhost

unstable
James Lee 2012-04-17 19:49:42 -06:00
parent afe28523f3
commit a2dc890cfa
1 changed files with 24 additions and 13 deletions

View File

@ -922,19 +922,30 @@ class Metasploit3 < Msf::Auxiliary
note_data[:arch] = arch if arch != "undefined" note_data[:arch] = arch if arch != "undefined"
print_status("#{cli.peerhost.ljust 16} Reporting: #{note_data.inspect}") print_status("#{cli.peerhost.ljust 16} Reporting: #{note_data.inspect}")
report_note({ # Reporting stuff isn't really essential since we store all
:host => cli.peerhost, # the target information locally. Make sure any exception
:type => 'javascript_fingerprint', # raised from the report_* methods doesn't prevent us from
:data => note_data, # sending exploits. This is really only an issue for
:update => :unique_data, # connections from localhost where we end up with
}) # ActiveRecord::RecordInvalid errors because 127.0.0.1 is
client_info = ({ # blacklisted in the Host validations.
:host => cli.peerhost, begin
:ua_string => request['User-Agent'], report_note({
:ua_name => ua_name, :host => cli.peerhost,
:ua_ver => ua_ver :type => 'javascript_fingerprint',
}) :data => note_data,
report_client(client_info) :update => :unique_data,
})
client_info = {
:host => cli.peerhost,
:ua_string => request['User-Agent'],
:ua_name => ua_name,
:ua_ver => ua_ver
}
report_client(client_info)
rescue => e
elog("Reporting failed: #{e.class} : #{e.message}")
end
end end
end end
end end