Skip to content

Commit 8fc6e20

Browse files
Update other modules to use java_class_loader_start_service and cmdstager_start_service
1 parent 70b21ff commit 8fc6e20

9 files changed

+9
-9
lines changed

modules/exploits/linux/http/suitecrm_log_file_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ def on_request_uri(cli, _request)
316316
end
317317

318318
def start_http_server
319-
start_service(
319+
cmdstager_start_service(
320320
{
321321
'Uri' => {
322322
'Proc' => proc do |cli, req|

modules/exploits/linux/http/vmware_vrli_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ def exploit
256256
pak_name = "#{file_name}.pak"
257257
register_files_for_cleanup("/tmp/#{pak_name}")
258258
print_status('Starting Payload Server')
259-
start_service('Path' => "/#{file_name}.tar")
259+
cmdstager_start_service('Path' => "/#{file_name}.tar")
260260

261261
# Connect to the Apache Thrift service
262262
thrift_client = Rex::Proto::Thrift::Client.new(

modules/exploits/linux/misc/saltstack_salt_unauth_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ def yeet_runner(root_key)
193193
)
194194
when :unix_cmd
195195
# HTTPS doesn't appear to be supported by the server :(
196-
print_status("Serving intermediate stager over HTTP: #{start_service}")
196+
print_status("Serving intermediate stager over HTTP: #{cmdstager_start_service}")
197197

198198
vprint_status("Executing Unix command: #{payload.encoded}")
199199

modules/exploits/multi/http/apache_commons_text4shell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ def exploit
129129
case target['Type']
130130
when :java
131131
# Start the HTTP server to serve the payload
132-
start_service
132+
java_class_loader_start_service
133133
# Trigger a loadClass request via java.net.URLClassLoader
134134
trigger_urlclassloader
135135
# Handle the payload

modules/exploits/multi/http/liferay_java_unmarshalling.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ def check
108108

109109
def exploit
110110
# Start our HTTP server to provide remote classloading
111-
@classloader_uri = start_service
111+
@classloader_uri = java_class_loader_start_service
112112

113113
unless @classloader_uri
114114
fail_with(Failure::BadConfig, 'Could not start remote classloader server')

modules/exploits/multi/http/microfocus_obm_auth_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ def check
7979

8080
def exploit
8181
# Start our HTTP server to provide remote classloading
82-
@classloader_uri = start_service
82+
@classloader_uri = java_class_loader_start_service
8383

8484
unless @classloader_uri
8585
fail_with(Failure::BadConfig, 'Could not start remote classloader server')

modules/exploits/multi/http/solr_velocity_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -381,7 +381,7 @@ def exploit
381381

382382
case target.name
383383
when /Java/
384-
@classloader_uri = start_service
384+
@classloader_uri = java_class_loader_start_service
385385
execute_java('core_name' => @vuln_core[0], 'auth_string' => @auth_string)
386386
return
387387
end

modules/exploits/multi/http/torchserver_cve_2023_43654.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ def generate_mar
126126
end
127127

128128
def exploit
129-
start_service
129+
java_class_loader_start_service
130130

131131
@model_name = rand_text_alphanumeric(8..15)
132132
print_status('Registering the model archive...')

modules/exploits/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ def exploit
130130
case target['Type']
131131
when :java
132132
# Start the HTTP server to serve the payload
133-
start_service
133+
java_class_loader_start_service
134134
# Trigger a loadClass request via java.net.URLClassLoader
135135
trigger_urlclassloader
136136
# Handle the payload

0 commit comments

Comments
 (0)