This oracle scheduler exploit hangs if not vuln

When this exploit gets run against a system that isn't vulnerable
it can hang for a signifigant ammount of time. This change uses the check
method on the exploit to see whether it should proceed. Don't try to exploit
the host if it's not vulnerable.
bug/bundler_fix
David Maloney 2014-12-16 09:42:42 -06:00
parent 2604746fb7
commit f237c56a13
No known key found for this signature in database
GPG Key ID: DEDBA9DC3A913DB2
1 changed files with 7 additions and 3 deletions

View File

@ -53,9 +53,13 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
execute_cmdstager({:linemax => 1500})
handler
if check == Exploit::CheckCode::Vulnerable
print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
execute_cmdstager({:linemax => 1500})
handler
else
print_error "#{rhost} does not appear to be vulnerable!"
end
end
def execute_command(cmd, opts)