got rid of duplicated code in browser exploits, fixes #71

git-svn-id: file:///home/svn/framework3/trunk@4642 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Matt Miller 2007-04-04 02:04:37 +00:00
parent 14cff709bc
commit a319b8e582
18 changed files with 11 additions and 85 deletions

View File

@ -270,6 +270,13 @@ protected
end
#
# By default, all HTTP servers are not subject to automatic exploitation
#
def autofilter
false
end
#
# Ensures that gzip can be used. If not, an exception is generated. The
# exception is only raised if the DisableGzip advanced option has not been
@ -285,7 +292,10 @@ protected
# This method gives a derived class the opportunity to ensure that all
# dependencies are present before initializing the service.
#
# By default, all HTTP server mixins will try to use zlib.
#
def check_dependencies
use_zlib
end
#

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -71,10 +71,6 @@ class Exploits::Windows::Browser::AimGoaway < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

View File

@ -108,14 +108,6 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def check_dependencies
use_zlib
end
def on_request_uri(cli, request)
mytarget = self.target

View File

@ -59,10 +59,6 @@ class Exploits::Windows::Browser::Apple_Itunes_Playlist < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

View File

@ -53,10 +53,6 @@ class Exploits::Windows::Browser::Apple_Quicktime_RTSP < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(client, request)
return if ((p = regenerate_payload(client)) == nil)

View File

@ -81,10 +81,6 @@ class Exploits::Windows::Browser::IE_CreateObject < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
if (request.uri.match(/payload/))

View File

@ -51,10 +51,6 @@ class Exploits::Windows::Browser::IE_IsComponentInstalled < Msf::Exploit::Remote
'DisclosureDate' => 'Feb 24 2006'))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload

View File

@ -68,10 +68,6 @@ class Exploits::Windows::Browser::McAfeeMcSubMgrVsprintf < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload

View File

@ -58,10 +58,6 @@ class Exploits::Windows::Browser::Mirc_Irc_Url < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

View File

@ -63,10 +63,6 @@ class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
clean = 0x7ffdec50
ret = nil

View File

@ -72,14 +72,6 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
'DefaultTarget' => 0))
end
def autofilter
false
end
def check_dependencies
use_zlib
end
def on_request_uri(cli, request)

View File

@ -68,10 +68,6 @@ class Exploits::Windows::Browser::MS06_013_CreateTextRange < Msf::Exploit::Remot
'DisclosureDate' => 'Mar 19 2006'))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload

View File

@ -56,10 +56,6 @@ class Exploits::Windows::Browser::MS06_055_VML_Overflow < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload

View File

@ -54,10 +54,6 @@ class Exploits::Windows::Browser::MS06_057_WebView_SetSlice < Msf::Exploit::Remo
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload

View File

@ -69,14 +69,6 @@ class Exploits::Windows::Browser::MS06_067_KEYFRAME < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def check_dependencies
use_zlib
end
def on_request_uri(cli, request)
return if ((p = regenerate_payload(cli)) == nil)

View File

@ -60,10 +60,6 @@ class Exploits::Windows::Browser::Realplayer_Smil < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

View File

@ -77,14 +77,6 @@ class Exploits::Windows::Browser::WinAmp_Playlist_UNC < Msf::Exploit::Remote
])
end
def autofilter
false
end
def check_dependencies
use_zlib
end
def on_request_uri(cli, request)
if (not request.uri.match(/\.pls$/i))

View File

@ -58,10 +58,6 @@ class Exploits::Windows::Browser::Xmplay_Asx < Msf::Exploit::Remote
'DefaultTarget' => 0))
end
def autofilter
false
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)