From e2b8d5ed2392cf2d57f6295ff611597f0bb146e8 Mon Sep 17 00:00:00 2001 From: HD Moore Date: Tue, 9 Apr 2013 02:07:40 -0500 Subject: [PATCH] Fix from David Kennedy, enable Windows 8 support --- modules/exploits/windows/local/bypassuac.rb | 10 ++-------- modules/post/windows/escalate/bypassuac.rb | 8 +------- 2 files changed, 3 insertions(+), 15 deletions(-) diff --git a/modules/exploits/windows/local/bypassuac.rb b/modules/exploits/windows/local/bypassuac.rb index b56b032c19..a91b2fefd7 100644 --- a/modules/exploits/windows/local/bypassuac.rb +++ b/modules/exploits/windows/local/bypassuac.rb @@ -56,14 +56,8 @@ class Metasploit3 < Msf::Exploit::Local # vuln = false winver = sysinfo["OS"] - affected = [ 'Windows Vista', 'Windows 7', 'Windows 2008', 'Windows 8' ] - affected.each { |v| - if winver.include? v - vuln = true - end - } - if not vuln - print_error("#{winver} does not have UAC") + if winver !~ /Windows Vista|Windows 2008|Windows [78]/ + print_error("#{winver} is not vulnerable.") return end diff --git a/modules/post/windows/escalate/bypassuac.rb b/modules/post/windows/escalate/bypassuac.rb index 921a1cfa61..8e53abeced 100644 --- a/modules/post/windows/escalate/bypassuac.rb +++ b/modules/post/windows/escalate/bypassuac.rb @@ -43,13 +43,7 @@ class Metasploit3 < Msf::Post vuln = false sysinfo = session.sys.config.sysinfo winver = sysinfo["OS"] - affected = [ 'Windows Vista', 'Windows 7', 'Windows 2008', 'Windows 8' ] - affected.each { |v| - if winver.include? v - vuln = true - end - } - if not vuln + if winver !~ /Windows Vista|Windows 2008|Windows [78]/ print_error("#{winver} is not vulnerable.") return end