Agent: Remove `blind_exploit` logic from web_rce.py and weblogic.py

This commit is contained in:
Shreya Malviya 2022-02-23 13:18:54 +05:30
parent 0501bb7037
commit ad5ce8e7d2
2 changed files with 0 additions and 10 deletions

View File

@ -77,10 +77,6 @@ class WebRCE(HostExploiter):
# vulnerable.
exploit_config["stop_checking_urls"] = False
# blind_exploit: If true we won't check if file exist and won't try to get the
# architecture of target.
exploit_config["blind_exploit"] = False
return exploit_config
def _exploit_host(self):
@ -105,10 +101,6 @@ class WebRCE(HostExploiter):
self.target_url = self.get_target_url()
# Check for targets architecture (if it's 32 or 64 bit)
if not exploit_config["blind_exploit"]:
return False
# Upload the right monkey to target
data = self.upload_monkey(self.get_target_url(), exploit_config["upload_commands"])

View File

@ -68,7 +68,6 @@ class WebLogic201710271(WebRCE):
def get_exploit_config(self):
exploit_config = super(WebLogic201710271, self).get_exploit_config()
exploit_config["blind_exploit"] = True
exploit_config["stop_checking_urls"] = True
exploit_config["url_extensions"] = WebLogic201710271.URLS
return exploit_config
@ -267,7 +266,6 @@ class WebLogic20192725(WebRCE):
def get_exploit_config(self):
exploit_config = super(WebLogic20192725, self).get_exploit_config()
exploit_config["url_extensions"] = WebLogic20192725.URLS
exploit_config["blind_exploit"] = True
exploit_config["dropper"] = True
return exploit_config