We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d689b33 commit c288dabCopy full SHA for c288dab
modules/exploits/linux/misc/drb_remote_codeexec.rb
@@ -104,8 +104,6 @@ def method_syscall(p)
104
end
105
106
register_file_for_cleanup(filename) if filename
107
- #print_status("payload executed from file #{filename}") unless filename.nil?
108
- #print_status("make sure to remove that file") unless filename.nil?
109
110
111
def exploit
@@ -121,6 +119,7 @@ def exploit
121
119
122
120
unless datastore['URI'].blank?
123
serveruri = datastore['URI']
+ (datastore['RHOST'], datastore['RPORT']) = serveruri.sub(/druby:\/\//i, '').split(':')
124
else
125
serveruri = "druby://#{datastore['RHOST']}:#{datastore['RPORT']}"
126
0 commit comments