Skip to content

Commit f7741f3

Browse files
committed
* Extend the -D option to disable too checking for updates performed by the jexboss client at http://joaomatosf.com/rnp/releases.txt (obs: this option also disables checking for updates performed by webshell in exploited server at http://webshell.jexboss.net//jsp_version.txt)
1 parent fe8425c commit f7741f3

File tree

1 file changed

+19
-16
lines changed

1 file changed

+19
-16
lines changed

jexboss.py

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
ENDC = '\033[0m'
3232

3333
__author__ = "João Filho Matos Figueiredo <[email protected]>"
34-
__version = "1.0.15"
34+
__version = "1.0.16"
3535

3636
from sys import argv, exit, version_info
3737

@@ -364,20 +364,21 @@ def main():
364364
:return: Exit code
365365
"""
366366
# check for Updates
367-
updates = check_updates()
368-
if updates:
369-
print(BLUE + BOLD + "\n\n * An update is available and is recommended update before continuing.\n" +
370-
" Do you want to update now?")
371-
pick = input(" YES/no ? ").lower() if version_info[0] >= 3 else raw_input(" YES/no ? ").lower()
372-
print (ENDC)
373-
if pick != "no":
374-
updated = auto_update()
375-
if updated:
376-
print(GREEN + BOLD + "\n * The JexBoss has been successfully updated. Please run again to enjoy the updates.\n" +ENDC)
377-
exit(0)
378-
else:
379-
print(RED + BOLD + "\n\n * An error occurred while updating the JexBoss. Please try again..\n" +ENDC)
380-
exit(1)
367+
if not gl_args.disable_check_updates:
368+
updates = check_updates()
369+
if updates:
370+
print(BLUE + BOLD + "\n\n * An update is available and is recommended update before continuing.\n" +
371+
" Do you want to update now?")
372+
pick = input(" YES/no ? ").lower() if version_info[0] >= 3 else raw_input(" YES/no ? ").lower()
373+
print (ENDC)
374+
if pick != "no":
375+
updated = auto_update()
376+
if updated:
377+
print(GREEN + BOLD + "\n * The JexBoss has been successfully updated. Please run again to enjoy the updates.\n" +ENDC)
378+
exit(0)
379+
else:
380+
print(RED + BOLD + "\n\n * An error occurred while updating the JexBoss. Please try again..\n" +ENDC)
381+
exit(1)
381382

382383
vulnerables = False
383384
# check vulnerabilities for standalone mode
@@ -522,7 +523,9 @@ def main():
522523
parser.add_argument("--auto-exploit", "-A",
523524
help="Send exploit code automatically (USE ONLY IF YOU HAVE PERMISSION!!!)",
524525
action='store_true')
525-
parser.add_argument("--disable-check-updates", "-D", help="Disable the check for updates performed by JSP Webshell at: http://webshell.jexboss.net/jsp_version.txt",
526+
parser.add_argument("--disable-check-updates", "-D", help="Disable two updates checks: 1) Check for updates "
527+
"performed by the webshell in exploited server at http://webshell.jexboss.net/jsp_version.txt and 2) check for updates "
528+
"performed by the jexboss client at http://joaomatosf.com/rnp/releases.txt",
526529
action='store_true')
527530
parser.add_argument('-mode', help="Operation mode", choices=['standalone', 'auto-scan', 'file-scan'], default='standalone')
528531

0 commit comments

Comments
 (0)