Replace WsfDelay with WfsDelay - Fixes #11018

GSoC/Meterpreter_Web_Console
Brendan Coles 2018-11-25 05:09:16 +00:00
parent debf79416b
commit 5c06cdca73
1 changed files with 3 additions and 18 deletions

View File

@ -40,6 +40,7 @@ class MetasploitModule < Msf::Exploit::Local
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
'WfsDelay' => 30
},
'Targets' =>
[
@ -59,18 +60,8 @@ class MetasploitModule < Msf::Exploit::Local
[ 'URL', 'https://seclists.org/fulldisclosure/2013/May/91' ],
],
'DisclosureDate' => 'May 15 2013',
'DefaultTarget' => 0,
# TODO: Uncomment this line and remove the Rex.sleep when WsfDelay works properly.
# Wait for up to 30 seconds by default for our shell because this exploit can
# take quite a while to finish execute
#'DefaultOptions' => { 'WfsDelay' => 30 }
'DefaultTarget' => 0
}))
# TODO: remove this when we've sorted out the WsfDelay issue.
register_options([
OptInt.new('WAIT', [ true, "Number of seconds to wait for exploit to run", 10 ])
])
end
def check
@ -154,12 +145,6 @@ class MetasploitModule < Msf::Exploit::Local
print_status("Payload injected. Executing exploit...")
host_process.thread.create(exploit_mem + offset, payload_mem)
# TODO: remove this Rex.sleep call when the WsfDelay stuff works correctly for local
# exploits. For some reason it doesn't appear to work properly.
wait = datastore['WAIT'].to_i
print_status("Exploit thread executing (can take a while to run), waiting #{wait} sec ...")
Rex.sleep(wait)
print_good("Exploit finished, wait for (hopefully privileged) payload execution to complete.")
print_status("Exploit thread executing (can take a while to run), waiting #{datastore['WfsDelay']} sec ...")
end
end