diff --git a/lib/msf/core/exploit/http/client.rb b/lib/msf/core/exploit/http/client.rb index 85672e923c..dda5870cea 100644 --- a/lib/msf/core/exploit/http/client.rb +++ b/lib/msf/core/exploit/http/client.rb @@ -292,7 +292,7 @@ module Exploit::Remote::HttpClient # The +opts+ will be updated to the updated location and +opts['redirect_uri']+ # will contain the full URI. # - def send_request_cgi_follow_redirect(opts={}, timeout = 20, redirect_depth = 1) + def send_request_cgi!(opts={}, timeout = 20, redirect_depth = 1) response = send_request_cgi(opts, timeout) if response && redirect_depth > 0 diff --git a/modules/exploits/multi/http/mediawiki_djvu.rb b/modules/exploits/multi/http/mediawiki_djvu.rb index 7105d809e5..3ec95f48ad 100644 --- a/modules/exploits/multi/http/mediawiki_djvu.rb +++ b/modules/exploits/multi/http/mediawiki_djvu.rb @@ -118,7 +118,7 @@ class Metasploit3 < Msf::Exploit::Remote opts = { 'uri' => normalize_uri(uri, 'index.php') } - response = send_request_cgi_follow_redirect(opts) + response = send_request_cgi!(opts) if opts['redirect_uri'] vprint_status("Redirected to #{opts['redirect_uri']}.")