From 36f9f342c1ec47fd3673c0ec8a9796055f3ffa24 Mon Sep 17 00:00:00 2001 From: julianvilas Date: Fri, 2 May 2014 16:26:08 +0200 Subject: [PATCH] Fix typo --- modules/exploits/multi/http/struts_code_exec_classloader.rb | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/struts_code_exec_classloader.rb b/modules/exploits/multi/http/struts_code_exec_classloader.rb index d44e390350..ee944aaeae 100644 --- a/modules/exploits/multi/http/struts_code_exec_classloader.rb +++ b/modules/exploits/multi/http/struts_code_exec_classloader.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Mark Thomas', # Vulnerability Discovery 'Przemyslaw Celej', # Vulnerability Discovery - 'pwntester ', # PoC 'Redsadic ' # Metasploit Module ], 'License' => MSF_LICENSE, @@ -192,7 +191,7 @@ class Metasploit3 < Msf::Exploit::Remote fail_with(Failure::TimeoutExpired, "#{peer} - No answer") end - # Check if the log file exists and hass been flushed + # Check if the log file exists and has been flushed if check_log_file(normalize_uri(target_uri.to_s)) register_files_for_cleanup(@jsp_file)