Whitespace, thanks msftidy.rb!

This commit is contained in:
James Lee
2012-05-31 18:18:27 -06:00
committed by Tod Beardsley
parent e0ce84a6e9
commit 2ee620cee4
7 changed files with 122 additions and 122 deletions
@@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
# RMI protocol specification
[ 'URL', 'http://download.oracle.com/javase/1.3/docs/guide/rmi/spec/rmi-protocol.html'],
# Placeholder reference for matching
[ 'MSF', 'java_rmi_server']
[ 'MSF', 'java_rmi_server']
],
'DisclosureDate' => 'Oct 15 2011',
'Platform' => ['java', 'win', 'osx', 'linux', 'solaris'],
@@ -84,7 +84,7 @@ class Metasploit3 < Msf::Exploit::Remote
'DefaultTarget' => 0
))
register_options( [ Opt::RPORT(1099) ], self.class)
register_autofilter_ports([ 1098, 1099 ])
register_autofilter_services(%W{ rmi rmid java-rmi rmiregistry })
end
@@ -122,7 +122,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_error("Not exploitable: the RMI class loader is disabled")
return
end
print_good("Target #{rhost}:#{rport} may be exploitable...")
# Wait for the request to be handled