Files
metasploit-gs/modules/exploits/linux
Valentin Lobstein fd92207119 Fix BeyondTrust exploit failing on older instances (22.x)
The /get_mech_list?version=3 endpoint returns HTTP 500 on older
BeyondTrust versions that do not support the JSON API. Add a
fallback to version=2 which returns semicolon-separated key=value
pairs (e.g. "company=sewtest;product=ingredi").

Also remove the "Thank you for using BeyondTrust" check in the
BRDF validation, as PRA instances do not contain this string,
causing the check method to incorrectly report Unknown for PRA
targets.
2026-02-25 10:12:21 +01:00
..
2025-10-07 13:59:13 -04:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-09-17 11:04:28 +02:00
2025-12-18 10:08:31 -05:00