File tree Expand file tree Collapse file tree 1 file changed +6
-13
lines changed
modules/auxiliary/admin/mssql Expand file tree Collapse file tree 1 file changed +6
-13
lines changed Original file line number Diff line number Diff line change @@ -15,27 +15,20 @@ def initialize(info = {})
15
15
super ( update_info ( info ,
16
16
'Name' => 'Microsoft SQL Server - SQLi Escalate Db_Owner' ,
17
17
'Description' => %q{
18
- This module can be used to escalate privileges to sysadmin if the user has
19
- the db_owner role in a trustworthy database owned by a sysadmin user. Once
20
- the user has the sysadmin role the mssql_payload_sqli module can be used to obtain
21
- a shell on the system.
18
+ This module can be used to escalate SQL Server user privileges to sysadmin through a web
19
+ SQL Injection. In order to escalate, the database user must to have the db_owner role in
20
+ a trustworthy database owned by a sysadmin user. Once the database user has the sysadmin
21
+ role, the mssql_payload_sqli module can be used to obtain a shell on the system.
22
22
23
- Syntax for injection URLs:
24
-
25
- Error: /account.asp?id=1+and+1=[SQLi];--
23
+ The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--
26
24
} ,
27
- 'Author' =>
28
- [
29
- 'nullbind <scott.sutherland[at]netspi.com>'
30
- ] ,
31
25
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>' ] ,
32
26
'License' => MSF_LICENSE ,
33
- 'References' => [ [ 'URL' , 'http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx' ] ]
27
+ 'References' => [ [ 'URL' , 'http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx' ] ]
34
28
) )
35
29
end
36
30
37
31
def run
38
-
39
32
# Get the database user name
40
33
print_status ( "#{ peer } - Grabbing the database user name from ..." )
41
34
db_user = get_username
You can’t perform that action at this time.
0 commit comments