From 3681955f683d6e0be22959a300bd4a01fffcc200 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Thu, 5 Sep 2013 08:28:50 -0500 Subject: [PATCH] Use Msf::Config.data_directory --- modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb b/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb index d3c5c3fdd9..ff79d36d55 100644 --- a/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb +++ b/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote 'DefaultTarget' => 0, 'DefaultOptions' => { - 'DECODERSTUB' => File.join(Msf::Config.install_root, "data", "exploits", "cmdstager", "vbs_b64_noquot") + 'DECODERSTUB' => File.join(Msf::Config.data_directory, "exploits", "cmdstager", "vbs_b64_noquot") }, 'DisclosureDate' => 'Jul 29 2013'))