We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 24bad9c commit ab60e0bCopy full SHA for ab60e0b
modules/exploits/multi/sap/sap_soap_rfc_sxpg_call_system_exec.rb
@@ -139,7 +139,7 @@ def exploit
139
if target.name =~ /Windows/
140
linemax = datastore['PAYLOAD_SPLIT']
141
vprint_status("#{rhost}:#{rport} - Using custom payload size of #{linemax}") if linemax != 250
142
- print_status("#{rhost}:#{rport} - Sending SOAP SXPG_COMMAND_EXECUTE request")
+ print_status("#{rhost}:#{rport} - Sending SOAP SXPG_CALL_SYSTEM request")
143
execute_cmdstager({ :delay => 0.35, :linemax => linemax })
144
elsif target.name =~ /Linux/
145
file = rand_text_alphanumeric(5)
0 commit comments