Path: blob/master/modules/exploits/coldfusion_dir_traversal_exploit/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5class Coldfusion_dir_traversal_exploit < BeEF::Core::Command6def self.options7[8{ 'name' => 'fileToRetrieve', 'ui_label' => 'Retrieve file (in CF /lib dir)', 'value' => 'password.properties' },9{ 'name' => 'os_combobox', 'type' => 'combobox', 'ui_label' => 'CF server OS', 'store_type' => 'arraystore',10'store_fields' => ['os'], 'store_data' => [['Windows'], ['Linux/MacOSX/*BSD']],11'valueField' => 'os', 'displayField' => 'os', 'mode' => 'local', 'autoWidth' => true },12{ 'name' => 'cf_version', 'type' => 'combobox', 'ui_label' => 'ColdFusion version', 'store_type' => 'arraystore',13'store_fields' => ['cf_version'], 'store_data' => [['8'], ['9']],14'valueField' => 'cf_version', 'displayField' => 'cf_version', 'mode' => 'local', 'autoWidth' => true }15]16end1718def post_execute19save({ 'result' => @datastore['result'] })20end21end222324