diff --git a/modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb b/modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb index 8c2ad28eb6af..97337ca5bd03 100644 --- a/modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb +++ b/modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb @@ -37,7 +37,6 @@ def initialize(info = {}) 'Linux Command', { 'Arch' => [ ARCH_CMD ], 'Platform' => [ 'unix', 'linux' ], 'Type' => :nix_cmd, 'DefaultOptions' => { - 'PAYLOAD' => 'cmd/linux/http/x64/meterpreter_reverse_tcp', 'FETCH_COMMAND' => 'WGET' } } @@ -99,6 +98,7 @@ def check # Extract the version version = Rex::Version.new(json_data['version']) @version3 = version < Rex::Version.new('4.0.0') + CheckCode::Appears("Version #{version} detected, which is vulnerable.") end