- Use CheckCode::Appears instead of CheckCode::Vulnerable per convention
- Add ARTIFACTS_ON_DISK to SideEffects for dropper target
- Simplify connect call by removing unnecessary uri argument
arrive after Rex finishes parsing the HTTP 101 response, leaving
res.body empty. Add a fallback that reads the frame directly from the
socket using get_wsframe with a timeout when the body is blank.
This module exploits an unauthenticated RCE vulnerability in the
Eclipse Che machine-exec service. The service accepts WebSocket
connections without authentication on port 3333, allowing command
execution via JSON-RPC.
Affects Red Hat OpenShift DevSpaces environments.