diff --git a/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb b/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb index 378d2f605c..8cb29c5e9f 100644 --- a/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb +++ b/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb @@ -81,7 +81,15 @@ class Metasploit3 < Msf::Exploit::Remote return Exploit::CheckCode::Unknown elsif res.code == 200 && /title="ActualAnalyzer Lite \(free\) (?[\d\.]+)"/ =~ res.body vprint_status("#{peer} - Found version: #{version}") - return Exploit::CheckCode::Vulnerable if Gem::Version.new(version) <= Gem::Version.new('2.81') + if Gem::Version.new(version) <= Gem::Version.new('2.81') + report_vuln( + host: rhost, + name: self.name, + info: "Module #{fullname} detected ActualAnalyzer #{version}", + refs: references, + ) + return Exploit::CheckCode::Vulnerable + end return Exploit::CheckCode::Detected elsif res.code == 200 && res.body =~ /ActualAnalyzer Lite/ return Exploit::CheckCode::Detected @@ -235,6 +243,7 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit + return unless check == Exploit::CheckCode::Vulnerable analytics_hosts = [] if datastore['ANALYZER_HOST'].blank? analytics_hosts << get_analytics_host_code