Home page logo
/

metasploit logo Metasploit mailing list archives

exploits/windows/iis/iis_webdav_upload_asp
From: Vincent den Boer <vincent () shishkabab net>
Date: Wed, 14 Apr 2010 13:31:54 +0200

Hi everyone,

I'm trying to exploit a server that's probably vulnerable to the 
iis_webdav_upload_asp exploit. The problem is that in the call to 
Msf::Exploit::Remote::HttpClient::send_request_cgi on line 60 doesn't return. 
The loop on line 211 never returns and the resp keeps getting filled with a '100 
continue' message even though that message was only sent once or twice by the 
remote server and the server also issued a '201 created' message. Does anyone 
know what could cause this? This is as far as my Ruby knowledge goes by the way 
;).

-- 
Kind regards,
Vincent den Boer
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]