Merge remote-tracking branch 'upstream/master' into bug/web-vuln-logging

bug/bundler_fix
Tasos Laskos 2013-03-06 23:04:10 +02:00
commit c3b3da4254
1 changed files with 5 additions and 5 deletions

View File

@ -63,7 +63,7 @@ module Exploit
exploit = oexploit.replicant
Msf::Simple::Framework.simplify_module( exploit, false )
yield(exploit) if block_given?
# Import options from the OptionStr or Option hash.
exploit._import_extra_options(opts)
@ -74,14 +74,14 @@ module Exploit
# Verify the options
exploit.options.validate(exploit.datastore)
# Start it up
driver = ExploitDriver.new(exploit.framework)
# Initialize the driver instance
driver.exploit = exploit
driver.payload = exploit.framework.payloads.create(opts['Payload'])
# Set the force wait for session flag if the caller requested force
# blocking. This is so that passive exploits can be blocked on from
# things like the cli.
@ -137,9 +137,9 @@ module Exploit
# Save the job identifier this exploit is running as
exploit.job_id = driver.job_id
# Propagate this back to the caller for console mgmt
oexploit.job_id = exploit.job_id
oexploit.job_id = exploit.job_id
rescue ::Interrupt
exploit.error = $!
raise $!