parent
6d0dbcb106
commit
2b3d48f2a0
|
@ -146,7 +146,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
return true, sql, d
|
return true, sql, d
|
||||||
elsif (response =~ /RDS Server Error: The server has denied access to the default RDS Handler used to access this page. See the Server Administrator for more information about server security settings./)
|
elsif (response =~ /RDS Server Error: The server has denied access to the default RDS Handler used to access this page. See the Server Administrator for more information about server security settings./)
|
||||||
print_error("Exploit failed: the server is patched")
|
print_error("Exploit failed: the server is patched")
|
||||||
break # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail.
|
return # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail.
|
||||||
elsif (response =~ /The Microsoft Jet database engine cannot find the input table or query \'(\w+)\'/)
|
elsif (response =~ /The Microsoft Jet database engine cannot find the input table or query \'(\w+)\'/)
|
||||||
vprint_error("Server is vulnerable but Microsoft Jet database cannot find table: #{$1}")
|
vprint_error("Server is vulnerable but Microsoft Jet database cannot find table: #{$1}")
|
||||||
elsif (response =~ /isn't a valid path/ || response =~ /is not a valid path/ || response =~ /Could not find file/)
|
elsif (response =~ /isn't a valid path/ || response =~ /is not a valid path/ || response =~ /Could not find file/)
|
||||||
|
|
Loading…
Reference in New Issue