diff --git a/extensions/admin_ui/media/javascript/ui/panel/common.js b/extensions/admin_ui/media/javascript/ui/panel/common.js index 5fc4e536a..1727e17b8 100644 --- a/extensions/admin_ui/media/javascript/ui/panel/common.js +++ b/extensions/admin_ui/media/javascript/ui/panel/common.js @@ -251,8 +251,14 @@ function genExistingExploitPanel(panel, command_id, zombie, sb) { for(index in record.data.data) { result = record.data.data[index]; index = index.toString().replace('_', ' '); - //output escape everything, but allow the
tag for better rendering. - html += String.format('{0}: {1}
', index, $jEncoder.encoder.encodeForHTML(result).replace(/<br>/g,'
')); + //Check if the data is the image parameter and that it's a base64 encoded png. + if ($jEncoder.encoder.encodeForHTML(result).replace(/<br>/g,'
').substring(0,28) == "image=data:image/png;base64,") { + //Lets display the image. // Does this introduce issues? Or, does the encoding keep this sound? + html += String.format('
', $jEncoder.encoder.encodeForHTML(result).replace(/<br>/g,'
').substring(6)); + } else { + //output escape everything, but allow the
tag for better rendering. + html += String.format('{0}: {1}
', index, $jEncoder.encoder.encodeForHTML(result).replace(/<br>/g,'
')); + } } html += '

';