Skip to content

Commit

Permalink
Group methods together.
Browse files Browse the repository at this point in the history
  • Loading branch information
postmodern committed May 19, 2024
1 parent a7a0760 commit 9201f4e
Showing 1 changed file with 11 additions and 11 deletions.
22 changes: 11 additions & 11 deletions exploits/activemq/CVE-2023-46604.rb
Original file line number Diff line number Diff line change
Expand Up @@ -80,6 +80,17 @@ class CVE_2023_46604 < Exploit
"https://github.com/mrpentst/CVE-2023-46604/blob/main/poc.xml"
]

default_port 61616

param :web_host, default: "localhost",
desc: "A routable hostname for the exploit runner's web server"

param :web_port, Integer, default: 1024 + rand(65535 - 1024),
desc: "A listen port for the exploit runner's web server"

param :exfil_file, default: '/etc/passwd',
desc: 'The file to exfiltrate'

#
# Test whether the target system is vulnerable.
#
Expand Down Expand Up @@ -112,17 +123,6 @@ def test
end
end

default_port 61616

param :web_host, default: "localhost",
desc: "A routable hostname for the exploit runner's web server"

param :web_port, Integer, default: 1024 + rand(65535 - 1024),
desc: "A listen port for the exploit runner's web server"

param :exfil_file, default: '/etc/passwd',
desc: 'The file to exfiltrate'

JAVA_CLASSNAME = "org.springframework.context.support.ClassPathXmlApplicationContext"
PROVIDER_VERSION = "ProviderVersion"
STRING_TYPE = 9
Expand Down

0 comments on commit 9201f4e

Please sign in to comment.