Better regex and email format correction

unstable
sinn3r 2012-07-27 01:14:32 -05:00
parent 2939e3918e
commit d67234bd03
1 changed files with 4 additions and 4 deletions

View File

@ -24,11 +24,11 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail[dot]com>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
],
'References' =>
[
['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/'],
['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/']
#['OSVDB', ''],
#['EDB', ''],
],
@ -65,9 +65,9 @@ class Metasploit3 < Msf::Exploit::Remote
'uri' => "#{base}"
})
if res.body =~ /<strong style="font-size:8pt;font-weight:normal">Version 2.11.2<\/strong><br>/
if res.body =~ /\<strong style\=\"font\-size\:8pt\;font\-weight\:normal\"\>Version 2\.11\.2\<\/strong\>\<br\>/
return Exploit::CheckCode::Vulnerable
elsif res.body =~ /<a href="http:\/\/cuteflow\.org" target="_blank">/
elsif res.body =~ /\<a href\=\"http\:\/\/cuteflow\.org" target\=\"\_blank\"\>/
return Exploit::CheckCode::Detected
else
return Exploit::CheckCode::Safe