Skip to content

Commit 4e32c80

Browse files
committed
Use the Msf::Exploit::CmdStager mixin. Fixes rapid7#8092.
1 parent 51298ac commit 4e32c80

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/windows/ssh/freesshd_authbypass.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::Remote::Tcp
1212
include Msf::Exploit::EXE
13+
include Msf::Exploit::CmdStager
1314

1415
def initialize(info={})
1516
super(update_info(info,
@@ -86,7 +87,7 @@ def upload_payload(connection)
8687
cmdstager = Rex::Exploitation::CmdStagerVBS.new(exe)
8788
opts = {
8889
:linemax => 1700,
89-
:decoder => File.join(Msf::Config.data_directory, "exploits", "cmdstager", "vbs_b64"),
90+
:decoder => default_decoder(:vbs)
9091
}
9192

9293
cmds = cmdstager.generate(opts)

0 commit comments

Comments
 (0)