Skip to content

Commit f27ef55

Browse files
committed
Land rapid7#7992, Improve Signature Evasions for browser exploits
2 parents 3457640 + 1ca0a24 commit f27ef55

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

Gemfile.lock

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ GEM
248248
metasm
249249
rex-arch
250250
rex-text
251-
rex-exploitation (0.1.10)
251+
rex-exploitation (0.1.11)
252252
jsobfu
253253
metasm
254254
rex-arch

lib/msf/core/exploit/remote/browser_exploit_server.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -430,7 +430,6 @@ def get_detection_html(user_agent)
430430
window.onload = function() {
431431
var osInfo = os_detect.getVersion();
432432
var d = {
433-
"os_name" : osInfo.os_name,
434433
"os_vendor" : osInfo.os_vendor,
435434
"os_device" : osInfo.os_device,
436435
"ua_name" : osInfo.ua_name,
@@ -439,7 +438,8 @@ def get_detection_html(user_agent)
439438
"java" : misc_addons_detect.getJavaVersion(),
440439
"silverlight" : misc_addons_detect.hasSilverlight(),
441440
"flash" : misc_addons_detect.getFlashVersion(),
442-
"vuln_test" : <%= js_vuln_test %>
441+
"vuln_test" : <%= js_vuln_test %>,
442+
"os_name" : osInfo.os_name
443443
};
444444
445445
<% if os.match(OperatingSystems::Match::WINDOWS) and client == HttpClients::IE %>

0 commit comments

Comments
 (0)