Switch to using :method, see previous commit

unstable
James Lee 2012-04-17 18:48:14 -06:00
parent 741de34d92
commit f9a48ace48
6 changed files with 6 additions and 6 deletions

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::BrowserAutopwn include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ autopwn_info({
:os_name => OperatingSystems::WINDOWS, :os_name => OperatingSystems::WINDOWS,
:vuln_test => "GetVariable", :method => "GetVariable",
:classid => "ShockwaveFlash.ShockwaveFlash", :classid => "ShockwaveFlash.ShockwaveFlash",
:rank => NormalRanking, # reliable memory corruption :rank => NormalRanking, # reliable memory corruption
:javascript => true :javascript => true

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
:javascript => true, :javascript => true,
:rank => NormalRanking, :rank => NormalRanking,
:classid => "{79956462-F148-497F-B247-DF35A095F80B}", :classid => "{79956462-F148-497F-B247-DF35A095F80B}",
:vuln_test => "DownloadImageFileURL", :method => "DownloadImageFileURL",
}) })
def initialize(info = {}) def initialize(info = {})

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
:javascript => true, :javascript => true,
:rank => NormalRanking, :rank => NormalRanking,
:classid => "{84B74E82-3475-420E-9949-773B4FB91771}", :classid => "{84B74E82-3475-420E-9949-773B4FB91771}",
:vuln_test => "RunAndUploadFile", :method => "RunAndUploadFile",
}) })
def initialize(info={}) def initialize(info={})

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_maxver => "6.1", :ua_maxver => "6.1",
:javascript => true, :javascript => true,
:os_name => OperatingSystems::WINDOWS, :os_name => OperatingSystems::WINDOWS,
:vuln_test => 'CreateObject', :method => [ 'CreateObject', 'GetObject' ],
:classid => :classid =>
[ [
'{BD96C556-65A3-11D0-983A-00C04FC29E36}', '{BD96C556-65A3-11D0-983A-00C04FC29E36}',

View File

@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0", # :ua_minver => "6.0",
# :javascript => true, # :javascript => true,
# :os_name => OperatingSystems::WINDOWS, # :os_name => OperatingSystems::WINDOWS,
# :vuln_test => 'KeyFrame',
# :classid => 'DirectAnimation.PathControl', # :classid => 'DirectAnimation.PathControl',
# :method => 'KeyFrame',
# :rank => NormalRanking # reliable memory corruption # :rank => NormalRanking # reliable memory corruption
#}) #})

View File

@ -21,8 +21,8 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_name => HttpClients::IE, :ua_name => HttpClients::IE,
:javascript => true, :javascript => true,
:os_name => OperatingSystems::WINDOWS, :os_name => OperatingSystems::WINDOWS,
:vuln_test => 'CreateNewFolderFromName',
:classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}', :classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
:method => 'CreateNewFolderFromName',
:rank => NormalRanking # reliable memory corruption :rank => NormalRanking # reliable memory corruption
}) })