From 363c0913ae4611b44224098ad3c256e9a2fc96c4 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 28 Aug 2012 16:33:01 +0200 Subject: [PATCH] changed dir names according to CVE --- .../{CVE-2012-XXXX => CVE-2012-4681}/Exploit.class | Bin .../{CVE-2012-XXXX => CVE-2012-4681}/Exploit.java | 0 modules/exploits/multi/browser/java_jre17_exec.rb | 2 +- 3 files changed, 1 insertion(+), 1 deletion(-) rename data/exploits/{CVE-2012-XXXX => CVE-2012-4681}/Exploit.class (100%) rename external/source/exploits/{CVE-2012-XXXX => CVE-2012-4681}/Exploit.java (100%) diff --git a/data/exploits/CVE-2012-XXXX/Exploit.class b/data/exploits/CVE-2012-4681/Exploit.class similarity index 100% rename from data/exploits/CVE-2012-XXXX/Exploit.class rename to data/exploits/CVE-2012-4681/Exploit.class diff --git a/external/source/exploits/CVE-2012-XXXX/Exploit.java b/external/source/exploits/CVE-2012-4681/Exploit.java similarity index 100% rename from external/source/exploits/CVE-2012-XXXX/Exploit.java rename to external/source/exploits/CVE-2012-4681/Exploit.java diff --git a/modules/exploits/multi/browser/java_jre17_exec.rb b/modules/exploits/multi/browser/java_jre17_exec.rb index 2bbd024edd..a932ac4240 100644 --- a/modules/exploits/multi/browser/java_jre17_exec.rb +++ b/modules/exploits/multi/browser/java_jre17_exec.rb @@ -100,7 +100,7 @@ class Metasploit3 < Msf::Exploit::Remote jar.add_file(full, '') end end - fd = File.open(File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-XXXX", path ), "rb") + fd = File.open(File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-4681", path ), "rb") data = fd.read(fd.stat.size) jar.add_file(path.join("/"), data) fd.close