Results 24 comments of wvu

I had used `FileDropper` in #15950. I can post a diff in a bit. That'll be the easiest way to test.

This should do for replicating the bug: ```diff wvu@kharak:~/rapid7/metasploit-framework:master$ git diff diff --git a/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb b/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb index a8566331ed..d2a21d5a10 100644 --- a/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb +++ b/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb @@ -10,6 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote...

![](https://media3.giphy.com/media/9WXyFIDv2PyBq/giphy.gif)

Many commands are like this, unfortunately. See #13948.