diff --git a/modules/exploits/windows/http/oracle_endeca_exec.rb b/modules/exploits/windows/http/oracle_endeca_exec.rb index 874127b370..fd94612b71 100644 --- a/modules/exploits/windows/http/oracle_endeca_exec.rb +++ b/modules/exploits/windows/http/oracle_endeca_exec.rb @@ -129,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote command = cmd_psh_payload(payload.encoded, payload_instance.arch.first) if command.length > 8000 # Windows 2008 Command Prompt Max Length is 8191 - fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command") + fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command") end print_status("#{peer} - Exploiting through Powershell...") execute_command(command)