Metasploit mailing list archives

Problem with Apache Win32 Chunked Encoding


From: rhyskidd at gmail.com (Rhys Kidd)
Date: Tue, 30 Oct 2007 20:12:35 +0900

Well the Check functionality should through the line below, indicate the
value of the "Server" HTTP Header.

print_status("Serer is probably not vulnerable: #{response['Server']}")   <-
By the way a typo there HD.

Seeing as your target server appears to not include the Server HTTP Header,
how are you picking the TARGET you are using?
Is the server even vulnerable? Can you find out the Apache build through
another means? Folder listing perhaps.

Rhys Kidd
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071030/e58b1bb6/attachment.htm>


Current thread: