Skip to content

Commit 3a00db3

Browse files
committed
Land rapid7#4404, Oracle scheduler exploit fix
2 parents c786852 + f237c56 commit 3a00db3

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

modules/exploits/windows/oracle/extjob.rb

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,13 @@ def initialize(info = {})
5353
end
5454

5555
def exploit
56-
print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
57-
execute_cmdstager({:linemax => 1500})
58-
handler
56+
if check == Exploit::CheckCode::Vulnerable
57+
print_status("Exploiting through \\\\#{datastore['RHOST']}\\orcljsex#{datastore['SID']} named pipe...")
58+
execute_cmdstager({:linemax => 1500})
59+
handler
60+
else
61+
print_error "#{rhost} does not appear to be vulnerable!"
62+
end
5963
end
6064

6165
def execute_command(cmd, opts)

0 commit comments

Comments
 (0)