Whitespace, thanks msftidy.rb!
This commit is contained in:
@@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
# RMI protocol specification
|
||||
[ 'URL', 'http://download.oracle.com/javase/1.3/docs/guide/rmi/spec/rmi-protocol.html'],
|
||||
# Placeholder reference for matching
|
||||
[ 'MSF', 'java_rmi_server']
|
||||
[ 'MSF', 'java_rmi_server']
|
||||
],
|
||||
'DisclosureDate' => 'Oct 15 2011',
|
||||
'Platform' => ['java', 'win', 'osx', 'linux', 'solaris'],
|
||||
@@ -84,7 +84,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
register_options( [ Opt::RPORT(1099) ], self.class)
|
||||
|
||||
|
||||
register_autofilter_ports([ 1098, 1099 ])
|
||||
register_autofilter_services(%W{ rmi rmid java-rmi rmiregistry })
|
||||
end
|
||||
@@ -122,7 +122,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
print_error("Not exploitable: the RMI class loader is disabled")
|
||||
return
|
||||
end
|
||||
|
||||
|
||||
print_good("Target #{rhost}:#{rport} may be exploitable...")
|
||||
|
||||
# Wait for the request to be handled
|
||||
|
||||
Reference in New Issue
Block a user