Skip to content

Commit c187f70

Browse files
authored
Update geutebrueck_gcore_x64_rce_bo.rb
Review changes with msftidy.
1 parent d5fd620 commit c187f70

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

modules/exploits/windows/http/geutebrueck_gcore_x64_rce_bo.rb

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
76
require 'nokogiri'
87
require 'open-uri'
98

@@ -24,21 +23,22 @@ def initialize(info = {})
2423
],
2524
'References' =>
2625
[
27-
['www.geutebrueck.com', '']
26+
['EDB','41153'],
27+
['URL','www.geutebrueck.com']
2828
],
2929
'Platform' => 'win',
3030
'Targets' =>
3131
[
32-
['Automatic Targeting', { 'auto' => true, 'Arch' => ARCH_X86_64 }],
33-
['GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X86_64 }],
34-
['GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X86_64 }]
32+
['Automatic Targeting', { 'auto' => true, 'Arch' => ARCH_X64 }],
33+
['GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X64}],
34+
['GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)', { 'Arch' => ARCH_X64}]
3535
],
3636
'Payload' =>
3737
{
3838
'Space' => '2000'
3939
},
40-
'Privileged' => false,
41-
'DisclosureDate' => '2017-01-24',
40+
'Privileged' => true,
41+
'DisclosureDate' => 'Jan 24 2017',
4242
'DefaultTarget' => 0))
4343
end
4444

@@ -272,7 +272,6 @@ def exploit
272272
print_status('Exploit ready for sending...')
273273
sock.put(exploit, 'Timeout' => 20)
274274
print_status('Exploit sent!')
275-
# sleep(10)
276275
buf = sock.get_once || ''
277276
rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError => e
278277
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")

0 commit comments

Comments
 (0)