Gaurav Jain

Results 48 comments of Gaurav Jain

I think this issue has been resolved ``` $ mitmdump -n -r ~/my.flow 127.0.0.1:56660: GET https://www.google.com/ HTTP/2.0

The fix used in the original PR was to override the `on_request_uri` method again to handle requests based on the target as such: ``` def on_request_uri(cli, request) case target['Type'] when...

On removing the inclusion of `Msf::Exploit::Remote::Java::HTTP::ClassLoader` in the exploit and running it again, setting target to `2 Linux (dropper)` results in a meterpreter shell: ``` msf6 exploit(multi/http/solr_velocity_rce) > show targets...

~I suppose this issue should be raised on `rapid7/metasploit-payloads` repo, If anyone can reproduce this issue, then I'll raise this issue on that repo~ Edit: I think this is a...

@cdelafuente-r7 now that a couple more exploits have this issue, we'd have to test existing exploits too

As mentioned in #18922, setting `spawn` to 0 solves this issue for `manageengine_servicedesk_plus_saml_rce_cve_2022_47966`. Is this a permanent fix or a temporary fix?

> ![image](https://user-images.githubusercontent.com/156560/258778817-fc18ef85-3170-4b43-aaae-1453f25626bd.png) > > ensure that our help text links to the website and support places, like github. I'm thinking of making the following changes in the help message: Old:...