diff --git a/modules/exploits/multi/http/orientdb_exec.rb b/modules/exploits/multi/http/orientdb_exec.rb index 0a42b163e3..c7c4530984 100644 --- a/modules/exploits/multi/http/orientdb_exec.rb +++ b/modules/exploits/multi/http/orientdb_exec.rb @@ -52,7 +52,7 @@ class MetasploitModule < Msf::Exploit::Remote uri = target_uri uri.path = normalize_uri(uri.path) res = send_request_raw({'uri' => "#{uri.path}listDatabases"}) - if res and res.code == 200 and res.headers['Server'] =~ /OrientDB Server v\.2\.2\.[2-9]|1[0-9]|2[0-2]/ + if res and res.code == 200 and res.headers['Server'] =~ /OrientDB Server v\.2\.2\./ print_good("Version: #{res.headers['Server']}") return Exploit::CheckCode::Vulnerable else