diff --git a/modules/exploits/multi/http/axis2_deployer.rb b/modules/exploits/multi/http/axis2_deployer.rb index 3ff046ce83..acf1734552 100644 --- a/modules/exploits/multi/http/axis2_deployer.rb +++ b/modules/exploits/multi/http/axis2_deployer.rb @@ -121,7 +121,6 @@ class Metasploit3 < Msf::Exploit::Remote 'headers' => { 'Content-Type' => 'multipart/form-data; boundary=' + boundary, - 'Content-Length' => data.length, 'Cookie' => "JSESSIONID=#{session}", } }, 25) diff --git a/modules/exploits/multi/http/glassfish_deployer.rb b/modules/exploits/multi/http/glassfish_deployer.rb index c33616faa8..5a1dc2b17b 100644 --- a/modules/exploits/multi/http/glassfish_deployer.rb +++ b/modules/exploits/multi/http/glassfish_deployer.rb @@ -88,7 +88,6 @@ class Metasploit3 < Msf::Exploit::Remote headers = {} headers['Cookie'] = "JSESSIONID=#{session}" if session != '' headers['Content-Type'] = ctype if ctype != nil - headers['Content-Length'] = data.length if data != nil res = send_request_raw({ 'uri' => path,