Skip to content

Commit a5c87db

Browse files
committed
Do minor cleanup
* Beautify description * Use double quotes for interpolation
1 parent e1164d3 commit a5c87db

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

modules/auxiliary/admin/mssql/mssql_escalate_execute_as_sqli.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,12 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Microsoft SQL Server - SQLi Escalate Execute As',
1717
'Description' => %q{
18-
This module can be used escalate privileges if the IMPERSONATION privilege has been assigned to the user
19-
via error based SQL injection. In most cases this results in additional data access, but in some cases it can be used to gain sysadmin
20-
privileges.
21-
18+
This module can be used escalate privileges if the IMPERSONATION privilege has been
19+
assigned to the user via error based SQL injection. In most cases this results in
20+
additional data access, but in some cases it can be used to gain sysadmin privileges.
2221
The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--
2322
},
24-
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>'],
23+
'Author' => ['nullbind <scott.sutherland[at]netspi.com>'],
2524
'License' => MSF_LICENSE,
2625
'References' => [['URL','http://msdn.microsoft.com/en-us/library/ms178640.aspx']]
2726
))
@@ -56,7 +55,7 @@ def run
5655
print_status("#{peer} - Enumerating a list of users that can be impersonated...")
5756
imp_user_list = check_imp_users
5857
if imp_user_list.nil? || imp_user_list.length == 0
59-
print_error('#{peer} - Sorry, the current user doesnt have permissions to impersonate anyone.')
58+
print_error("#{peer} - Sorry, the current user doesnt have permissions to impersonate anyone.")
6059
return
6160
else
6261
# Display list of users that can be impersonated

0 commit comments

Comments
 (0)