metasploit-framework/data/exploits/CVE-2021-44228
RageLtMan 4f07a2fbea First "working" 2021-44228 exploit module state
Clean up the Java code for PayloadFactory - the `main()` function
is actually not required, the error seen on initial attempts to
compile was some sort of PEBKAC or weird things in classpaths.

Update the module to start the HTTP server before issuing the HTTP
request starting the call chain which eventually executes the Java
PayloadFactory - that chain is quick and races with the service's
startup time to get the JAR containing the Payload and its factory.

Minor misc cleanup.
Give credit where due: we stand on the shoulders of giants.

Testing:
  LDAP request is serviced with response containing our JAR URL and
trigger parameters for the factory to instantiate Payload.class and
call its `main()` function.
  HTTP request is serviced to deliver the JAR.
  Payload handler on MSF-side is tripped with incoming connection.
2021-12-29 09:10:07 -05:00
..
metasploit First "working" 2021-44228 exploit module state 2021-12-29 09:10:07 -05:00
http_headers.txt Support scanning multiple HTTP headers 2021-12-15 08:45:24 -05:00
http_uris.txt Update Log4Shell references and VCenter URI 2021-12-17 15:55:02 -05:00