diff --git a/modules/auxiliary/scanner/http/verb_auth_bypass.rb b/modules/auxiliary/scanner/http/verb_auth_bypass.rb index dac8fa397a..c9eb6fafd0 100644 --- a/modules/auxiliary/scanner/http/verb_auth_bypass.rb +++ b/modules/auxiliary/scanner/http/verb_auth_bypass.rb @@ -77,10 +77,10 @@ class Metasploit3 < Msf::Auxiliary next if not resauth - print_status("Testing verb #{tv}, resp code: [#{resauth.code}]") + print_status("[#{ip}] Testing verb #{tv}, resp code: [#{resauth.code}]") if resauth.code != auth_code and resauth.code <= 302 - print_status("Possible authentication bypass with verb #{tv} code #{resauth.code}") + print_good("[#{ip}] Possible authentication bypass with verb #{tv} code #{resauth.code}") # Unable to use report_web_vuln as method is not in list of allowed methods.