diff --git a/modules/exploits/multi/http/struts_code_exec_classloader.rb b/modules/exploits/multi/http/struts_code_exec_classloader.rb index d44e390350..ee944aaeae 100644 --- a/modules/exploits/multi/http/struts_code_exec_classloader.rb +++ b/modules/exploits/multi/http/struts_code_exec_classloader.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Mark Thomas', # Vulnerability Discovery 'Przemyslaw Celej', # Vulnerability Discovery - 'pwntester ', # PoC 'Redsadic ' # Metasploit Module ], 'License' => MSF_LICENSE, @@ -192,7 +191,7 @@ class Metasploit3 < Msf::Exploit::Remote fail_with(Failure::TimeoutExpired, "#{peer} - No answer") end - # Check if the log file exists and hass been flushed + # Check if the log file exists and has been flushed if check_log_file(normalize_uri(target_uri.to_s)) register_files_for_cleanup(@jsp_file)