Skip to content

Commit 118caa1

Browse files
committed
Fix rapid7#7021, Pass exploit SRVPORT in BrowserAutopwn2
In BrowserAutoPwn2, the mixin forgets to pass the SRVPORT datastore option to the exploits, so they always use the default 8080. As a result, if a different SRVPORT is set, BAP2 would be serving the target machine with bad exploit links. Fix rapid7#7021
1 parent afbeb2b commit 118caa1

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

lib/msf/core/exploit/browser_autopwn2.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,7 @@ def set_exploit_options(xploit)
130130
xploit.datastore['PAYLOAD'] = p.first[:payload_name]
131131
xploit.datastore['LPORT'] = p.first[:payload_lport]
132132
xploit.datastore['SRVHOST'] = datastore['SRVHOST']
133+
xploit.datastore['SRVPORT'] = datastore['SRVPORT']
133134
xploit.datastore['LHOST'] = get_payload_lhost
134135

135136
%w(JsObfuscate CookieName VERBOSE Retries SSL SSLVersion SSLCipher URIHOST URIPORT).each do |opt|

0 commit comments

Comments
 (0)