Skip to content

Commit 50c7212

Browse files
committed
::Errno::EINVAL, disable obfuscation, revoke ms14-064
1 parent d23c9b5 commit 50c7212

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

lib/rex/socket.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -735,7 +735,7 @@ def getpeername
735735
peer_name = nil
736736
begin
737737
peer_name = Socket.from_sockaddr(super)
738-
rescue ::Exception => e
738+
rescue ::Errno::EINVAL => e
739739
# Ruby's getpeername method may call rb_sys_fail("getpeername(2)")
740740
elog("#{e.message} (#{e.class})#{e.backtrace * "\n"}\n", 'core', LEV_3)
741741
end

modules/auxiliary/server/browser_autopwn.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -236,9 +236,9 @@ def setup
236236
print_debug("NOTE: Debug Mode; javascript will not be obfuscated")
237237
else
238238
pre = Time.now
239-
print_status("Obfuscating initial javascript #{pre}")
240-
@init_js.obfuscate
241-
print_status "Done in #{Time.now - pre} seconds"
239+
#print_status("Obfuscating initial javascript #{pre}")
240+
#@init_js.obfuscate
241+
#print_status "Done in #{Time.now - pre} seconds"
242242
end
243243

244244
#@init_js << "window.onload = #{@init_js.sym("bodyOnLoad")};";
@@ -826,8 +826,8 @@ def build_script_response(cli, request)
826826
js << "#{js_debug("'starting exploits (' + global_exploit_list.length + ' total)<br>'")}\n"
827827
js << "window.next_exploit(0);\n"
828828

829-
js = ::Rex::Exploitation::JSObfu.new(js)
830-
js.obfuscate unless datastore["DEBUG"]
829+
#js = ::Rex::Exploitation::JSObfu.new(js)
830+
#js.obfuscate unless datastore["DEBUG"]
831831

832832
response.body = "#{js}"
833833
print_status("Responding with #{sploit_cnt} exploits")

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ class Metasploit4 < Msf::Exploit::Remote
1111
Rank = ExcellentRanking
1212

1313
include Msf::Exploit::Remote::BrowserExploitServer
14-
include Msf::Exploit::Remote::BrowserAutopwn
14+
#include Msf::Exploit::Remote::BrowserAutopwn
1515
include Msf::Exploit::Powershell
1616

17-
autopwn_info({
18-
:ua_name => HttpClients::IE,
19-
:ua_minver => "3.0",
20-
:ua_maxver => "10.0",
21-
:javascript => true,
22-
:os_name => OperatingSystems::Match::WINDOWS,
23-
:rank => ExcellentRanking
24-
})
17+
#autopwn_info({
18+
# :ua_name => HttpClients::IE,
19+
# :ua_minver => "3.0",
20+
# :ua_maxver => "10.0",
21+
# :javascript => true,
22+
# :os_name => OperatingSystems::Match::WINDOWS,
23+
# :rank => ExcellentRanking
24+
#})
2525

2626
def initialize(info={})
2727
super(update_info(info,

0 commit comments

Comments
 (0)