metasploit-framework/lib/rex/powershell
RageLtMan 537dc6e218 Update Payload Cached Sizes fails in PSH Script
When attempting to update cached payload sizes which utilize the
Rex::Powershell functionality, the BRE block which appropriates
initial code is called with the 'code' variable being a nil which
results in:

```
lib/rex/powershell/script.rb:40:in `initialize': no implicit
conversion of nil into String (TypeError)
```

This throws a conditional into the File.open call which presents an
empty string instead of a nil. This still results in the rescue
block having to catch the exception, but manages to keep the
payload size updating script happy an retains consistent
behavior.
2015-06-07 11:42:24 -04:00
..
command.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
function.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
obfu.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
output.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
param.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
parser.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
payload.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
psh_methods.rb Refactor Msf::Exploit::Powershell to Rex::Powershell to allow for 2015-02-10 20:53:46 +00:00
script.rb Update Payload Cached Sizes fails in PSH Script 2015-06-07 11:42:24 -04:00