We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent c474ff4 commit 0db22c5Copy full SHA for 0db22c5
modules/exploits/windows/local/service_permissions.rb
@@ -174,7 +174,7 @@ def exploit
174
filename = Rex::Text.rand_text_alpha((rand(8)+6)) + ".exe"
175
tempexe_name = Rex::Text.rand_text_alpha((rand(8)+6)) + ".exe"
176
177
- dir_env = session.sys.config.getenvs('SystemRoot', 'TEMP')
+ dir_env = get_envs('SystemRoot', 'TEMP')
178
sysdir = dir_env['SystemRoot']
179
tmpdir = dir_env['TEMP']
180
tempexe = tmpdir + "\\" + tempexe_name
0 commit comments