Home page logo

metasploit logo Metasploit mailing list archives

From: Vincent den Boer <vincent () shishkabab net>
Date: Wed, 14 Apr 2010 13:31:54 +0200

Hi everyone,

I'm trying to exploit a server that's probably vulnerable to the 
iis_webdav_upload_asp exploit. The problem is that in the call to 
Msf::Exploit::Remote::HttpClient::send_request_cgi on line 60 doesn't return. 
The loop on line 211 never returns and the resp keeps getting filled with a '100 
continue' message even though that message was only sent once or twice by the 
remote server and the server also issued a '201 created' message. Does anyone 
know what could cause this? This is as far as my Ruby knowledge goes by the way 

Kind regards,
Vincent den Boer

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]