Skip to content

Commit 8344c2c

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0630187 commit 8344c2c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

db/modules_metadata_base.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -189249,9 +189249,9 @@
189249189249
"Nathan Kirk",
189250189250
"OJ Reeves"
189251189251
],
189252-
"description": "This module executes an arbitrary native payload on a Microsoft SQL\n server by loading a custom SQL CLR Assembly into the target SQL\n installation, and calling it directly with a base64-encoded payload.\n\n The module requires working credentials in order to connect directly to the\n MSSQL Server.\n\n This method requires the user to have sufficient privileges to install a custom\n SQL CRL DLL, and invoke the custom stored procedure that comes with it.\n\n This exploit does not leave any binaries on disk.\n\n Tested on MS SQL Server versions: 2005, 2012, 2016 (all x64).",
189252+
"description": "This module executes an arbitrary native payload on a Microsoft SQL\n server by loading a custom SQL CLR Assembly into the target SQL\n installation, and calling it directly with a base64-encoded payload.\n\n The module requires working credentials in order to connect directly to the\n MSSQL Server.\n\n This method requires the user to have sufficient privileges to install a custom\n SQL CRL DLL, and invoke the custom stored procedure that comes with it.\n\n This exploit does not leave any binaries on disk.\n\n Tested on MS SQL Server versions: 2005, 2012, 2016 (all x64).",
189253189253
"references": [
189254-
"URL-http://sekirkity.com/command-execution-in-sql-server-via-fileless-clr-based-custom-stored-procedure/"
189254+
"URL-https://web.archive.org/web/20200810021536/http://sekirkity.com/command-execution-in-sql-server-via-fileless-clr-based-custom-stored-procedure/"
189255189255
],
189256189256
"platform": "Windows",
189257189257
"arch": "x86, x64",
@@ -189273,7 +189273,7 @@
189273189273
"targets": [
189274189274
"Automatic"
189275189275
],
189276-
"mod_time": "2020-10-02 17:38:06 +0000",
189276+
"mod_time": "2025-01-09 20:58:40 +0000",
189277189277
"path": "/modules/exploits/windows/mssql/mssql_clr_payload.rb",
189278189278
"is_install_path": true,
189279189279
"ref_name": "windows/mssql/mssql_clr_payload",

0 commit comments

Comments
 (0)