diff --git a/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb b/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb index 9fa5c4cec3..4b4c9cf3a5 100644 --- a/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb +++ b/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb @@ -110,7 +110,7 @@ class MetasploitModule < Msf::Exploit::Remote def exploit - if not datastore['CMD'].empty? + if !datastore['CMD'].blank? print_status("Executing command '#{datastore['CMD']}'") execute_command(datastore['CMD']) return