diff --git a/modules/exploits/windows/fileformat/office_word_hta.rb b/modules/exploits/windows/fileformat/office_word_hta.rb index a7469b4052..955229898c 100644 --- a/modules/exploits/windows/fileformat/office_word_hta.rb +++ b/modules/exploits/windows/fileformat/office_word_hta.rb @@ -4,7 +4,7 @@ ## require 'msf/core' -require 'rex/ole' + class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking @@ -79,6 +79,7 @@ class MetasploitModule < Msf::Exploit::Remote uri = Rex::Text.hexify(Rex::Text.to_unicode(uri)) uri.delete!("\n") uri.delete!("\\x") + uri.delete!("\\") padding_length = uri_maxlength * 2 - uri.length fail_with(Failure::BadConfig, "please use a uri < #{uri_maxlength} bytes ") if padding_length.negative?