From c0d17734ed72c6cd551bc22b66c0f7cc9e1cc9e9 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 17 May 2012 15:00:00 -0500 Subject: [PATCH] Improve run-on sentences. --- .../exploits/windows/http/bea_weblogic_post_bof.rb | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/modules/exploits/windows/http/bea_weblogic_post_bof.rb b/modules/exploits/windows/http/bea_weblogic_post_bof.rb index 2e0a473127..2fcbb2ed57 100644 --- a/modules/exploits/windows/http/bea_weblogic_post_bof.rb +++ b/modules/exploits/windows/http/bea_weblogic_post_bof.rb @@ -22,14 +22,12 @@ class Metasploit3 < Msf::Exploit::Remote Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST - requests resulting in a buffer overflow due to the insecure usage - of sprintf. - - The Weblogic Apache plugin version is fingerprinted with a POST - request containing a specially crafted Transfer-Encoding header. - - At this moment this module works over Windows systems without DEP + requests, resulting a buffer overflow due to the insecure usage + of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. + + In addition, the Weblogic Apache plugin version is fingerprinted with a POST + request containing a specially crafted Transfer-Encoding header. }, 'Author' => [ @@ -92,7 +90,7 @@ class Metasploit3 < Msf::Exploit::Remote res = send_request_cgi({ 'method' => 'POST', 'uri' => target_uri.path, - 'headers' => + 'headers' => { 'Transfer-Encoding' => my_data },