From 01b943ec937f027065f9bf7f299fd852b8466c8b Mon Sep 17 00:00:00 2001 From: Christian Mehlmauer Date: Wed, 16 Dec 2015 07:26:25 +0100 Subject: [PATCH] fix check method --- modules/exploits/multi/http/joomla_http_header_rce.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/joomla_http_header_rce.rb b/modules/exploits/multi/http/joomla_http_header_rce.rb index 053a0c8042..1b72f2afbc 100644 --- a/modules/exploits/multi/http/joomla_http_header_rce.rb +++ b/modules/exploits/multi/http/joomla_http_header_rce.rb @@ -91,7 +91,7 @@ class Metasploit3 < Msf::Exploit::Remote res = send_request_cgi({'uri' => normalize_uri(target_uri.path, 'plugins', 'system', 'cache', 'cache.xml') }) return Exploit::CheckCode::Detected if res && res.code == 200 && res.body && res.body.include?('Joomla! Project') - Exploit::CheckCode::Safe + Exploit::CheckCode::Unknown end def get_payload