From f344a01bd9df93a8a435a9f8f2512611f4c79981 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 3 May 2019 16:22:48 +0200 Subject: [PATCH] DREI final patch for --os-pwn --- lib/core/settings.py | 2 +- lib/takeover/metasploit.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/core/settings.py b/lib/core/settings.py index 49d002eef..41de2c88e 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -18,7 +18,7 @@ from lib.core.enums import OS from thirdparty import six # sqlmap version (...) -VERSION = "1.3.5.16" +VERSION = "1.3.5.17" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index 36f4ceac4..41c9db016 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -640,7 +640,7 @@ class Metasploit: raise SqlmapFilePathException(errMsg) self._shellcodeFP = open(self._shellcodeFilePath, "rb") - self.shellcodeString = self._shellcodeFP.read() + self.shellcodeString = getText(self._shellcodeFP.read()) self._shellcodeFP.close() os.unlink(self._shellcodeFilePath)