-
Notifications
You must be signed in to change notification settings - Fork 13.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ms01_026_dbldecode triggers undefined method on payload_exe #4246
Comments
wchen-r7
added a commit
to wchen-r7/metasploit-framework
that referenced
this issue
Dec 5, 2014
This fixes an undef method 'payload_exe' error. We broke this when all modules started using Msf::Exploit::CmdStager as the only source to get a command stager payload. The problem with that is "payload_exe" is an accessor in CmdStagerTFTP, not in CmdStager, so when the module wants to access that, we trigger the undef method error. To be exact, this is the actual commit that broke it: 7ced592 Fix rapid7#4246
This was referenced Dec 5, 2014
wchen-r7
added a commit
to wchen-r7/metasploit-framework
that referenced
this issue
Dec 5, 2014
Fix rapid7#4246 ... so it will automatically close the ticket.
todb-r7
pushed a commit
that referenced
this issue
Dec 12, 2014
f25e3eb does not fix this. |
Really? It does not? |
Oh you're right, yeah it's the other one that fixes this. |
You said it didn't? You said you referenced the wrong PR? I don't know now, you tell me. Sent from a tiny computer. |
Yeah f25e3eb is for the other ticket. |
jvazquez-r7
added a commit
that referenced
this issue
Dec 26, 2014
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Reported on IRC by
netsecstudent
. The WINDIR option is incorrect, but the stack trace seems unrelated.The text was updated successfully, but these errors were encountered: