We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 77d0fe5 commit 8fe0003Copy full SHA for 8fe0003
modules/exploits/multi/http/wondercms_rce.rb
@@ -10,6 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
10
11
include Msf::Exploit::Remote::HttpServer
12
include Msf::Exploit::Remote::HttpClient
13
+ include Msf::Exploit::FileDropper
14
prepend Msf::Exploit::Remote::AutoCheck
15
16
def initialize(info = {})
@@ -113,6 +114,7 @@ def create_vulnerable_zip
113
114
]
115
116
@vuln_zip = Msf::Util::EXE.to_zip(files)
117
+ register_file_for_cleanup(@payload_filename)
118
end
119
120
def on_request_uri(cli, _request)
0 commit comments