diff --git a/modules/auxiliary/server/browser_autopwn.rb b/modules/auxiliary/server/browser_autopwn.rb index 3b105c31d1..0b3498d05e 100644 --- a/modules/auxiliary/server/browser_autopwn.rb +++ b/modules/auxiliary/server/browser_autopwn.rb @@ -230,24 +230,7 @@ class Metasploit3 < Msf::Auxiliary ENDJS if (datastore['DEBUG']) - print_status("Adding debug code") - @init_js << <<-ENDJS - if (!(typeof(debug) == 'function')) { - function htmlentities(str) { - str = str.replace(/>/g, '>'); - str = str.replace(/"')} @@ -699,7 +685,7 @@ class Metasploit3 < Msf::Auxiliary return true; } return false; - } + }; ENDJS # End of IE-specific test functions end @@ -719,9 +705,9 @@ class Metasploit3 < Msf::Auxiliary document.body.innerHTML += (str); } window.next_exploit = function (exploit_idx) { - #{js_debug("'next_exploit(' + exploit_idx +')'")} + #{js_debug("'next_exploit(' + exploit_idx +')
'")} if (!global_exploit_list[exploit_idx]) { - #{js_debug("'End'")} + #{js_debug("'End
'")} return; } #{js_debug("'trying ' + global_exploit_list[exploit_idx].resource + '
'")} @@ -739,8 +725,6 @@ class Metasploit3 < Msf::Auxiliary //document.body.appendChild(tn); if (!test) { test = "true"; - } else { - test = "try {" + test + "} catch (e) { is_vuln = false; }; is_vuln"; } if (eval(test)) {