From 28fe4c0be5b09dd7f1791dfc7035907414631943 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Wed, 6 Jun 2012 11:15:07 -0500 Subject: [PATCH] What's this break stuff? "break" should be "return" --- modules/exploits/windows/iis/msadc.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/iis/msadc.rb b/modules/exploits/windows/iis/msadc.rb index 5232eeb7d6..303feb2792 100644 --- a/modules/exploits/windows/iis/msadc.rb +++ b/modules/exploits/windows/iis/msadc.rb @@ -146,7 +146,7 @@ class Metasploit3 < Msf::Exploit::Remote return true, sql, d elsif (response =~ /RDS Server Error: The server has denied access to the default RDS Handler used to access this page. See the Server Administrator for more information about server security settings./) print_error("Exploit failed: the server is patched") - break # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail. + return # we cannot continue - server refuses to accept RDS traffic from remote IPs. bail. elsif (response =~ /The Microsoft Jet database engine cannot find the input table or query \'(\w+)\'/) vprint_error("Server is vulnerable but Microsoft Jet database cannot find table: #{$1}") elsif (response =~ /isn't a valid path/ || response =~ /is not a valid path/ || response =~ /Could not find file/)