Importing a web-based RCE exploit into Metasploit