@@ -56,7 +56,7 @@ def run
56
56
disconnect
57
57
return
58
58
else
59
- # Display list of accessible databases to user
59
+ # Display list of users that can be impersonated
60
60
print_good ( "#{ imp_user_list . length } users can be impersonated:" )
61
61
imp_user_list . each do |db |
62
62
print_status ( " - #{ db [ 0 ] } " )
@@ -113,7 +113,7 @@ def check_imp_users
113
113
sql = "SELECT DISTINCT b.name
114
114
FROM sys.server_permissions a
115
115
INNER JOIN sys.server_principals b
116
- ON a.grantor_principal_id = b.principal_id
116
+ ON a.grantor_principal_id = b.principal_id
117
117
WHERE a.permission_name = 'IMPERSONATE'"
118
118
119
119
result = mssql_query ( sql )
@@ -126,7 +126,7 @@ def check_imp_users
126
126
def check_imp_sysadmin ( trust_db_list )
127
127
# Check if the user has the db_owner role is any databases
128
128
trust_db_list . each do |imp_user |
129
- # Setup query
129
+ # Setup query
130
130
sql = "select IS_SRVROLEMEMBER('sysadmin','#{ imp_user [ 0 ] } ') as status"
131
131
132
132
# Run query
@@ -136,11 +136,11 @@ def check_imp_sysadmin(trust_db_list)
136
136
parse_results = result [ :rows ]
137
137
status = parse_results [ 0 ] [ 0 ]
138
138
if status == 1
139
- print_good ( " - #{ imp_user [ 0 ] } is a sysadmin!" )
140
- return imp_user
139
+ print_good ( " - #{ imp_user [ 0 ] } is a sysadmin!" )
140
+ return imp_user
141
141
else
142
142
print_status ( " - #{ imp_user [ 0 ] } is NOT sysadmin!" )
143
- end
143
+ end
144
144
end
145
145
nil
146
146
end
0 commit comments