1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00
git-svn-id: file:///home/svn/incoming/trunk@2898 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Matt Miller 2005-09-25 19:47:48 +00:00
parent b49241c90a
commit 109aa7f63b
2 changed files with 12 additions and 0 deletions

View File

@ -210,6 +210,17 @@ protected
return Rex::Proto::Http::Response.new(code, message, proto); return Rex::Proto::Http::Response.new(code, message, proto);
end end
#
# Transmits an HTML response to the supplied client.
#
def send_html_response(cli, body, headers = nil)
response = create_response
response['Content-Type'] = 'text/html'
response.body = body
cli.send_response(response)
end
# #
# Generates a random URI for use with making finger printing more # Generates a random URI for use with making finger printing more
# challenging. # challenging.

View File

@ -93,6 +93,7 @@ class Exploits::Windows::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
# Transmit the response to the client # Transmit the response to the client
send_html_response(cli, content)
response = create_response response = create_response
response['Content-Type'] = 'text/html' response['Content-Type'] = 'text/html'
response.body = content response.body = content