got rid of duplicated code in browser exploits, fixes #71
git-svn-id: file:///home/svn/framework3/trunk@4642 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
14cff709bc
commit
a319b8e582
|
@ -270,6 +270,13 @@ protected
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# By default, all HTTP servers are not subject to automatic exploitation
|
||||||
|
#
|
||||||
|
def autofilter
|
||||||
|
false
|
||||||
|
end
|
||||||
|
|
||||||
#
|
#
|
||||||
# Ensures that gzip can be used. If not, an exception is generated. The
|
# Ensures that gzip can be used. If not, an exception is generated. The
|
||||||
# exception is only raised if the DisableGzip advanced option has not been
|
# exception is only raised if the DisableGzip advanced option has not been
|
||||||
|
@ -285,7 +292,10 @@ protected
|
||||||
# This method gives a derived class the opportunity to ensure that all
|
# This method gives a derived class the opportunity to ensure that all
|
||||||
# dependencies are present before initializing the service.
|
# dependencies are present before initializing the service.
|
||||||
#
|
#
|
||||||
|
# By default, all HTTP server mixins will try to use zlib.
|
||||||
|
#
|
||||||
def check_dependencies
|
def check_dependencies
|
||||||
|
use_zlib
|
||||||
end
|
end
|
||||||
|
|
||||||
#
|
#
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -71,10 +71,6 @@ class Exploits::Windows::Browser::AimGoaway < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
|
@ -108,14 +108,6 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def check_dependencies
|
|
||||||
use_zlib
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
mytarget = self.target
|
mytarget = self.target
|
||||||
|
|
|
@ -59,10 +59,6 @@ class Exploits::Windows::Browser::Apple_Itunes_Playlist < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
|
@ -53,10 +53,6 @@ class Exploits::Windows::Browser::Apple_Quicktime_RTSP < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(client, request)
|
def on_request_uri(client, request)
|
||||||
|
|
||||||
return if ((p = regenerate_payload(client)) == nil)
|
return if ((p = regenerate_payload(client)) == nil)
|
||||||
|
|
|
@ -81,10 +81,6 @@ class Exploits::Windows::Browser::IE_CreateObject < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
if (request.uri.match(/payload/))
|
if (request.uri.match(/payload/))
|
||||||
|
|
|
@ -51,10 +51,6 @@ class Exploits::Windows::Browser::IE_IsComponentInstalled < Msf::Exploit::Remote
|
||||||
'DisclosureDate' => 'Feb 24 2006'))
|
'DisclosureDate' => 'Feb 24 2006'))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
|
|
|
@ -68,10 +68,6 @@ class Exploits::Windows::Browser::McAfeeMcSubMgrVsprintf < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
|
|
|
@ -58,10 +58,6 @@ class Exploits::Windows::Browser::Mirc_Irc_Url < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
|
@ -63,10 +63,6 @@ class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
clean = 0x7ffdec50
|
clean = 0x7ffdec50
|
||||||
ret = nil
|
ret = nil
|
||||||
|
|
|
@ -72,14 +72,6 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def check_dependencies
|
|
||||||
use_zlib
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -68,10 +68,6 @@ class Exploits::Windows::Browser::MS06_013_CreateTextRange < Msf::Exploit::Remot
|
||||||
'DisclosureDate' => 'Mar 19 2006'))
|
'DisclosureDate' => 'Mar 19 2006'))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
|
|
|
@ -56,10 +56,6 @@ class Exploits::Windows::Browser::MS06_055_VML_Overflow < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
|
|
|
@ -54,10 +54,6 @@ class Exploits::Windows::Browser::MS06_057_WebView_SetSlice < Msf::Exploit::Remo
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
|
|
|
@ -69,14 +69,6 @@ class Exploits::Windows::Browser::MS06_067_KEYFRAME < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def check_dependencies
|
|
||||||
use_zlib
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
||||||
|
|
|
@ -60,10 +60,6 @@ class Exploits::Windows::Browser::Realplayer_Smil < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
|
@ -77,14 +77,6 @@ class Exploits::Windows::Browser::WinAmp_Playlist_UNC < Msf::Exploit::Remote
|
||||||
])
|
])
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def check_dependencies
|
|
||||||
use_zlib
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
if (not request.uri.match(/\.pls$/i))
|
if (not request.uri.match(/\.pls$/i))
|
||||||
|
|
|
@ -58,10 +58,6 @@ class Exploits::Windows::Browser::Xmplay_Asx < Msf::Exploit::Remote
|
||||||
'DefaultTarget' => 0))
|
'DefaultTarget' => 0))
|
||||||
end
|
end
|
||||||
|
|
||||||
def autofilter
|
|
||||||
false
|
|
||||||
end
|
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
# Re-generate the payload
|
# Re-generate the payload
|
||||||
return if ((p = regenerate_payload(cli)) == nil)
|
return if ((p = regenerate_payload(cli)) == nil)
|
||||||
|
|
Loading…
Reference in New Issue