From 2c05af721c6535ebdf6313eed0416e0f1bfa9cfa Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Fri, 11 Jan 2013 00:57:05 +0100 Subject: [PATCH] module also updated with refs --- modules/exploits/multi/browser/java_jre17_jmxbean.rb | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/browser/java_jre17_jmxbean.rb b/modules/exploits/multi/browser/java_jre17_jmxbean.rb index 093d67d9f9..c9b7e032a3 100644 --- a/modules/exploits/multi/browser/java_jre17_jmxbean.rb +++ b/modules/exploits/multi/browser/java_jre17_jmxbean.rb @@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote 'juan vazquez' # Metasploit module ], 'References' => [ + [ 'CVE', '2013-0422' ], + [ 'US-CERT-VU', '625617' ], [ 'URL', 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ], [ 'URL', 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ] ], @@ -73,9 +75,9 @@ class Metasploit3 < Msf::Exploit::Remote def setup - path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "Exploit.class") + path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "Exploit.class") @exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } - path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "B.class") + path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "B.class") @loader_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } @exploit_class_name = rand_text_alpha("Exploit".length)