forked from p15670423/monkey
Agent: Remove `blind_exploit` logic from web_rce.py and weblogic.py
This commit is contained in:
parent
0501bb7037
commit
ad5ce8e7d2
|
@ -77,10 +77,6 @@ class WebRCE(HostExploiter):
|
|||
# vulnerable.
|
||||
exploit_config["stop_checking_urls"] = False
|
||||
|
||||
# blind_exploit: If true we won't check if file exist and won't try to get the
|
||||
# architecture of target.
|
||||
exploit_config["blind_exploit"] = False
|
||||
|
||||
return exploit_config
|
||||
|
||||
def _exploit_host(self):
|
||||
|
@ -105,10 +101,6 @@ class WebRCE(HostExploiter):
|
|||
|
||||
self.target_url = self.get_target_url()
|
||||
|
||||
# Check for targets architecture (if it's 32 or 64 bit)
|
||||
if not exploit_config["blind_exploit"]:
|
||||
return False
|
||||
|
||||
# Upload the right monkey to target
|
||||
data = self.upload_monkey(self.get_target_url(), exploit_config["upload_commands"])
|
||||
|
||||
|
|
|
@ -68,7 +68,6 @@ class WebLogic201710271(WebRCE):
|
|||
|
||||
def get_exploit_config(self):
|
||||
exploit_config = super(WebLogic201710271, self).get_exploit_config()
|
||||
exploit_config["blind_exploit"] = True
|
||||
exploit_config["stop_checking_urls"] = True
|
||||
exploit_config["url_extensions"] = WebLogic201710271.URLS
|
||||
return exploit_config
|
||||
|
@ -267,7 +266,6 @@ class WebLogic20192725(WebRCE):
|
|||
def get_exploit_config(self):
|
||||
exploit_config = super(WebLogic20192725, self).get_exploit_config()
|
||||
exploit_config["url_extensions"] = WebLogic20192725.URLS
|
||||
exploit_config["blind_exploit"] = True
|
||||
exploit_config["dropper"] = True
|
||||
return exploit_config
|
||||
|
||||
|
|
Loading…
Reference in New Issue