1 | /******************************************************************************* | |
2 | * Copyhacked (H) 2012-2020. | |
3 | * This program and the accompanying materials | |
4 | * are made available under no term at all, use it like | |
5 | * you want, but share and discuss about it | |
6 | * every time possible with every body. | |
7 | * | |
8 | * Contributors: | |
9 | * ron190 at ymail dot com - initial implementation | |
10 | ******************************************************************************/ | |
11 | package com.jsql.view.swing.shell; | |
12 | ||
13 | import com.jsql.view.swing.util.MediatorHelper; | |
14 | ||
15 | import java.net.MalformedURLException; | |
16 | import java.net.URISyntaxException; | |
17 | import java.util.UUID; | |
18 | ||
19 | /** | |
20 | * A terminal for web shell injection. | |
21 | */ | |
22 | public class ShellWeb extends AbstractShell { | |
23 | | |
24 | /** | |
25 | * Build a webshell instance. | |
26 | * @param terminalID Unique identifier to discriminate beyond multiple opened terminals | |
27 | * @param urlShell URL of current shell | |
28 | * @throws MalformedURLException | |
29 | */ | |
30 | public ShellWeb(UUID terminalID, String urlShell) throws MalformedURLException, URISyntaxException { | |
31 | | |
32 | super(terminalID, urlShell, "system"); | |
33 | | |
34 |
1
1. <init> : removed call to com/jsql/view/swing/shell/ShellWeb::setName → NO_COVERAGE |
this.setName("webShell"); |
35 | } | |
36 | ||
37 | @Override | |
38 | public void action(String command, UUID terminalID, String urlShell, String... arg) { | |
39 | MediatorHelper.model().getResourceAccess().runWebShell(command, terminalID, urlShell); | |
40 | } | |
41 | } | |
Mutations | ||
34 |
1.1 |