Metasploit mailing list archives
exploits/windows/iis/iis_webdav_upload_asp
From: Vincent den Boer <vincent () shishkabab net>
Date: Wed, 14 Apr 2010 13:31:54 +0200
Hi everyone, I'm trying to exploit a server that's probably vulnerable to the iis_webdav_upload_asp exploit. The problem is that in the call to Msf::Exploit::Remote::HttpClient::send_request_cgi on line 60 doesn't return. The loop on line 211 never returns and the resp keeps getting filled with a '100 continue' message even though that message was only sent once or twice by the remote server and the server also issued a '201 created' message. Does anyone know what could cause this? This is as far as my Ruby knowledge goes by the way ;). -- Kind regards, Vincent den Boer _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- exploits/windows/iis/iis_webdav_upload_asp Vincent den Boer (Apr 14)
- Message not available
- Re: exploits/windows/iis/iis_webdav_upload_asp Vincent den Boer (Apr 16)
- Message not available