Created
September 10, 2016 18:55
-
-
Save busterb/999b44b48470b5c4891d6c79d8db2503 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- a/lib/msf/core/exploit/remote/browser_exploit_server.rb | |
+++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb | |
@@ -103,7 +103,8 @@ module Msf | |
register_advanced_options([ | |
OptString.new('CookieName', [false, "The name of the tracking cookie", DEFAULT_COOKIE_NAME]), | |
OptString.new('CookieExpiration', [false, "Cookie expiration in years (blank=expire on exit)"]), | |
- OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]) | |
+ OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]), | |
+ OptString.new('IgnoreBrowserRequirements', [false, "Ignore browser requirements for the exploit"]) | |
], Exploit::Remote::BrowserExploitServer) | |
end | |
@@ -234,6 +235,7 @@ module Msf | |
# @param profile [Hash] The profile to check | |
# @return [Array] An array of requirements not met | |
def get_bad_requirements(profile) | |
+ return [] if datastore['IgnoreBrowserRequirements'] | |
bad_reqs = [] | |
@requirements.each do |rk, v| | |
k = rk.to_sym |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment