Files
metasploit-gs/lib/msf/core/exploit/http
RageLtMan d7ba37d2e6 Msf::Exploit::Remote::HttpServer print_* fix
Exploit::Remote::HttpServer and every descendant utilizes the
print_prefix method which checks whether the module which mixes in
these modules is aggressive. This is done in a proc context most
of the time since its a callback on the underlying Rex HTTP server.

When modules do not define :aggressive? the resulting exceptions
are quietly swallowed, and requestors get an empty response as the
client object dies off.

Add check for response to :aggressive? in :print_prefix to address
this issue.
2016-02-21 20:20:22 -05:00
..
2015-10-15 10:35:07 -05:00
2015-12-21 22:59:13 -06:00
2015-10-15 10:35:07 -05:00
2016-01-28 13:58:24 -06:00
2016-01-22 07:38:44 +01:00
2015-10-15 10:35:07 -05:00
2015-12-18 21:14:04 -06:00
2015-10-15 10:35:07 -05:00
2015-10-15 10:35:07 -05:00