-
Notifications
You must be signed in to change notification settings - Fork 13.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allows set PAYLOAD
parameters to begin with /
, payload/
, & /payload/
#12946
Conversation
set PAYLOAD
parameters to begin with \
, payload\
, & \payload\
set PAYLOAD
parameters to begin with /
, payload/
, & /payload/
Somewhat related tickets: #7734 and #8882. metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb Lines 665 to 671 in b76e76b
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think rn-no-release-notes
is warranted here. This is a significant change to core code.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perhaps using a single shared code between cmd_set
and cmd_use
in lib/msf/ui/console/command_dispatcher/common.rb is best.
Excellent enhancement. |
Btw, the verification steps use an x64 payload, which is not supported by the module, but setting it works fine. |
Setting the payload by index still works. 👍 |
Thanks for this! Quotes cleaned up in c591704. |
Release NotesThis enhances the |
When setting a module
PAYLOAD
value, you are currently unable to set a payload if it's path begins with/
,payload/
, &/payload/
. This is a pain when copy pasting full paths intoset PAYLOAD
commands.This PR adds a regex statement to catch and remove the above three path beginnings to the
command_dispatcher/core.rb
, allowing the underlying code to retrieve the payload correctly without the user having to change their input.Verification
List the steps needed to make sure this thing works
msfconsole
use crosschex
set PAYLOAD /payload/windows/x64/vncinject/reverse_winhttps
set PAYLOAD payload/windows/x64/vncinject/reverse_winhttps
set PAYLOAD /windows/x64/vncinject/reverse_winhttps
set PAYLOAD windows/x64/vncinject/reverse_winhttps
PAYLOAD => windows/x64/vncinject/reverse_winhttps