@@ -34,6 +34,8 @@ def initialize( info = {} )
34
34
'juan vazquez' # Metasploit module
35
35
] ,
36
36
'References' => [
37
+ [ 'CVE' , '2013-0422' ] ,
38
+ [ 'US-CERT-VU' , '625617' ] ,
37
39
[ 'URL' , 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ] ,
38
40
[ 'URL' , 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ]
39
41
] ,
@@ -73,9 +75,9 @@ def initialize( info = {} )
73
75
74
76
75
77
def setup
76
- path = File . join ( Msf ::Config . install_root , "data" , "exploits" , "j7u10_jmx " , "Exploit.class" )
78
+ path = File . join ( Msf ::Config . install_root , "data" , "exploits" , "cve-2013-0422 " , "Exploit.class" )
77
79
@exploit_class = File . open ( path , "rb" ) { |fd | fd . read ( fd . stat . size ) }
78
- path = File . join ( Msf ::Config . install_root , "data" , "exploits" , "j7u10_jmx " , "B.class" )
80
+ path = File . join ( Msf ::Config . install_root , "data" , "exploits" , "cve-2013-0422 " , "B.class" )
79
81
@loader_class = File . open ( path , "rb" ) { |fd | fd . read ( fd . stat . size ) }
80
82
81
83
@exploit_class_name = rand_text_alpha ( "Exploit" . length )
0 commit comments