diff --git a/modules/exploits/windows/fileformat/foxit_reader_uaf.rb b/modules/exploits/windows/fileformat/foxit_reader_uaf.rb index a1b7391f8b..af82d436dd 100644 --- a/modules/exploits/windows/fileformat/foxit_reader_uaf.rb +++ b/modules/exploits/windows/fileformat/foxit_reader_uaf.rb @@ -59,7 +59,7 @@ class MetasploitModule < Msf::Exploit::Remote end def pdfdoc - share = datastore['SHARE'].empty? ? "#{Rex::Text.rand_text_alpha_lower(1)}.exe" : datastore['SHARE'] + share = datastore['SHARE'].empty? ? "#{Rex::Text.rand_text_alpha_lower(1)}" : datastore['SHARE'] fname = datastore['EXENAME'].empty? ? "#{Rex::Text.rand_text_alpha_lower(1)}.exe" : datastore['EXENAME'] fname << '.exe' unless fname.ends_with?('.exe')