Skip to content

Commit acc590b

Browse files
committed
Modify metadata
1 parent 1381c7f commit acc590b

File tree

1 file changed

+6
-13
lines changed

1 file changed

+6
-13
lines changed

modules/auxiliary/admin/mssql/mssql_escalate_dbowner_sqli.rb

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,27 +15,20 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Microsoft SQL Server - SQLi Escalate Db_Owner',
1717
'Description' => %q{
18-
This module can be used to escalate privileges to sysadmin if the user has
19-
the db_owner role in a trustworthy database owned by a sysadmin user. Once
20-
the user has the sysadmin role the mssql_payload_sqli module can be used to obtain
21-
a shell on the system.
18+
This module can be used to escalate SQL Server user privileges to sysadmin through a web
19+
SQL Injection. In order to escalate, the database user must to have the db_owner role in
20+
a trustworthy database owned by a sysadmin user. Once the database user has the sysadmin
21+
role, the mssql_payload_sqli module can be used to obtain a shell on the system.
2222
23-
Syntax for injection URLs:
24-
25-
Error: /account.asp?id=1+and+1=[SQLi];--
23+
The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--
2624
},
27-
'Author' =>
28-
[
29-
'nullbind <scott.sutherland[at]netspi.com>'
30-
],
3125
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>'],
3226
'License' => MSF_LICENSE,
33-
'References' => [[ 'URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']]
27+
'References' => [['URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']]
3428
))
3529
end
3630

3731
def run
38-
3932
# Get the database user name
4033
print_status("#{peer} - Grabbing the database user name from ...")
4134
db_user = get_username

0 commit comments

Comments
 (0)