remove erroneous OUTPUTPATH overriding the sane one from the fileformat mixin

git-svn-id: file:///home/svn/framework3/trunk@11353 4d416f70-5f16-0410-b530-b9f4589650da
unstable
James Lee 2010-12-16 20:11:01 +00:00
parent c46be9d387
commit f1c13e24a6
6 changed files with 3 additions and 10 deletions

View File

@ -58,7 +58,6 @@ class Metasploit3 < Msf::Exploit::Remote
OptString.new('INFILENAME', [ true, 'The Input PDF filename.']),
OptString.new('EXENAME', [ false, 'The Name of payload exe.']),
OptString.new('FILENAME', [ false, 'The output filename.', 'evil.pdf']),
OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']),
OptString.new('LAUNCH_MESSAGE', [ false, 'The message to display in the File: area',
"To view the encrypted content please tick the \"Do not show this message again\" box and press Open."]),
], self.class)

View File

@ -68,7 +68,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
OptString.new('EXENAME', [ false, 'The Name of payload exe.', 'msf.exe']),
OptString.new('FILENAME', [ false, 'The output filename.', 'evil.pdf']),
OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']),
OptString.new('LAUNCH_MESSAGE', [ false, 'The message to display in the File: area',
"To view the encrypted content please tick the \"Do not show this message again\" box and press Open."]),
], self.class)

View File

@ -59,8 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('FILENAME', [ false, 'The file name.', 'msf-salamander-pdb.exe']),
OptString.new('OUTPUTPATH', [ false, 'The location of the file.', './data/exploits/']),
OptString.new('FILENAME', [ false, 'The file name.', 'msf-salamander-pdb.exe'])
], self.class)
end

View File

@ -65,8 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('FILENAME', [ false, 'The output filename.', 'corelan_foxit.pdf']),
OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/'])
OptString.new('FILENAME', [ false, 'The output filename.', 'corelan_foxit.pdf'])
], self.class)
end

View File

@ -51,9 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('FILENAME', [ false, 'The output filename.', 'corelannuance.pdf']),
OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']),
OptString.new('FILENAME', [ false, 'The output filename.', 'corelannuance.pdf'])
], self.class)
end

View File

@ -65,7 +65,6 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('FILENAME', [ false, 'The output filename.', 'm_101_xion.m3u']),
OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']),
# seh offset depends on path length
OptString.new('TARGETPATH', [ false, 'The target output.', 'C:\\'])
], self.class)