parent
6d0dbcb106
commit
2b3d48f2a0
|
@ -146,7 +146,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
return true, sql, d
|
||||
elsif (response =~ /RDS Server Error: The server has denied access to the default RDS Handler used to access this page. See the Server Administrator for more information about server security settings./)
|
||||
print_error("Exploit failed: the server is patched")
|
||||
break # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail.
|
||||
return # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail.
|
||||
elsif (response =~ /The Microsoft Jet database engine cannot find the input table or query \'(\w+)\'/)
|
||||
vprint_error("Server is vulnerable but Microsoft Jet database cannot find table: #{$1}")
|
||||
elsif (response =~ /isn't a valid path/ || response =~ /is not a valid path/ || response =~ /Could not find file/)
|
||||
|
|
Loading…
Reference in New Issue