updated windows udf files and documentation
parent
b21d73a170
commit
d299831efe
Binary file not shown.
Binary file not shown.
|
@ -1,6 +1,10 @@
|
|||
## Vulnerable Application
|
||||
|
||||
This vulnerability expoits mysql by adding a .so or .dll file which has a system call in it to the plugins folder.
|
||||
The Windows dll files are provided by [@stamparm](https://github.com/stamparm) of the sqlmap project and are
|
||||
located [here](https://github.com/rapid7/metasploit-framework/files/1879611/mysql_udf_libs.zip). As noted
|
||||
in [#9677](https://github.com/rapid7/metasploit-framework/issues/9677#issuecomment-378893925) these are 'de-cloaked' versions,
|
||||
which may attract AV attention.
|
||||
The file is then loaded by mysql, and arbitrary commands can be run. There are several caveats for this to
|
||||
function however, including:
|
||||
1. `secure_file_priv`, a mysql setting, must be changed from the default to allow writing
|
||||
|
|
Loading…
Reference in New Issue