Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
--- a/lib/msf/core/exploit/remote/browser_exploit_server.rb
+++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb
@@ -103,7 +103,8 @@ module Msf
register_advanced_options([
OptString.new('CookieName', [false, "The name of the tracking cookie", DEFAULT_COOKIE_NAME]),
OptString.new('CookieExpiration', [false, "Cookie expiration in years (blank=expire on exit)"]),
- OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"])
+ OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]),
+ OptString.new('IgnoreBrowserRequirements', [false, "Ignore browser requirements for the exploit"])
], Exploit::Remote::BrowserExploitServer)
end
@@ -234,6 +235,7 @@ module Msf
# @param profile [Hash] The profile to check
# @return [Array] An array of requirements not met
def get_bad_requirements(profile)
+ return [] if datastore['IgnoreBrowserRequirements']
bad_reqs = []
@requirements.each do |rk, v|
k = rk.to_sym
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment