diff --git a/modules/exploits/multi/http/oracle_weblogic_wsat_deserialization_rce.rb b/modules/exploits/multi/http/oracle_weblogic_wsat_deserialization_rce.rb index 4b3a580558..00bc196542 100644 --- a/modules/exploits/multi/http/oracle_weblogic_wsat_deserialization_rce.rb +++ b/modules/exploits/multi/http/oracle_weblogic_wsat_deserialization_rce.rb @@ -37,7 +37,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Targets' => [ [ 'Windows Command payload', { 'Arch' => ARCH_CMD, 'Platform' => 'win' } ], - [ 'Unix Command payload', { 'Arch' => ARCH_CMD, Platform => 'unix' } ], + [ 'Unix Command payload', { 'Arch' => ARCH_CMD, 'Platform' => 'unix' } ] ], 'DisclosureDate' => "Oct 19 2017", # Note that this is by index, rather than name. It's generally easiest