From 0b2737da7c893356977e503e57ff3991ebedd86e Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Mon, 14 Apr 2014 22:22:30 -0500 Subject: [PATCH] Two more java payloads that wanted to write RHOST There are three total, and they're all copy-pasted from the original module from 2009. I suspect this idiom isn't used at all any more -- I can't detect a difference in the payload if I just declare a host being cli.peerhost, rather than rewriting RHOST to be cli.peerhost. [SeeRM #8498] --- modules/exploits/multi/browser/java_calendar_deserialize.rb | 2 +- modules/exploits/multi/browser/java_verifier_field_access.rb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/browser/java_calendar_deserialize.rb b/modules/exploits/multi/browser/java_calendar_deserialize.rb index fccc4c5086..8ae57ea1da 100644 --- a/modules/exploits/multi/browser/java_calendar_deserialize.rb +++ b/modules/exploits/multi/browser/java_calendar_deserialize.rb @@ -119,7 +119,7 @@ class Metasploit3 < Msf::Exploit::Remote print_status("Payload will be a Java reverse shell") else port = datastore['LPORT'] - datastore['RHOST'] = cli.peerhost + host = cli.peerhost print_status("Payload will be a Java bind shell") end if jar diff --git a/modules/exploits/multi/browser/java_verifier_field_access.rb b/modules/exploits/multi/browser/java_verifier_field_access.rb index e0c99d4975..84fa7a5463 100644 --- a/modules/exploits/multi/browser/java_verifier_field_access.rb +++ b/modules/exploits/multi/browser/java_verifier_field_access.rb @@ -122,7 +122,7 @@ class Metasploit3 < Msf::Exploit::Remote vprint_status("Sending java reverse shell") else port = datastore['LPORT'] - datastore['RHOST'] = cli.peerhost + host = cli.peerhost vprint_status( "Java bind shell" ) end if jar