Skip to content

Commit aaf95f9

Browse files
authored
Apply suggestions from code review
1 parent d0d4c30 commit aaf95f9

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

documentation/modules/exploit/windows/http/pgadmin_binary_path_api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ For a production setup, a server like Apache should be setup to run pgAdmin thro
2727
1. [Download][1] and install the Windows build
2828
1. Copy the `config_distro.py` file to `config_local.py`
2929
1. Edit `config_local.py` and set `SERVER_MODE` to `True`
30+
1. Edit `config_local.py` and add `DEFAULT_SERVER = '0.0.0.0'` to bind on all IPs, required for remotely exploiting from a different machine
3031
1. Initialize the database: `..\python\python.exe setup.py setup-db`
3132
1. Create an initial user account: `..\python\python.exe setup.py add-user --admin [email protected] 123456`
3233
1. Run the application: `..\python\python.exe pgAdmin4.py`

modules/exploits/windows/http/pgadmin_binary_path_api.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ def get_version
108108
else
109109
res = send_request_cgi('uri' => normalize_uri(target_uri.path, 'browser/'), 'keep_cookies' => true)
110110
end
111-
html_document = res.get_html_document
111+
html_document = res&.get_html_document
112112
return unless html_document && html_document.xpath('//title').text == 'pgAdmin 4'
113113

114114
# there's multiple links in the HTML that expose the version number in the [X]XYYZZ,

0 commit comments

Comments
 (0)