Skip to content

Commit 59ffe5d

Browse files
committed
Land rapid7#5306, payload_exe NameError fix
2 parents 4b0f54f + 5cb8b9a commit 59ffe5d

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/windows/antivirus/ams_hndlrsvc.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
1111

1212
include Msf::Exploit::CmdStager
1313
include Msf::Exploit::Remote::Tcp
14+
include Msf::Exploit::EXE
1415

1516
def initialize(info = {})
1617
super(update_info(info,
@@ -53,7 +54,7 @@ def initialize(info = {})
5354
def windows_stager
5455
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
5556
execute_cmdstager({ :temp => '.' })
56-
@payload_exe = payload_exe
57+
@payload_exe = generate_payload_exe
5758

5859
print_status("Attempting to execute the payload...")
5960
execute_command(@payload_exe)

0 commit comments

Comments
 (0)