diff --git a/modules/exploits/windows/http/ektron_xslt_exec.rb b/modules/exploits/windows/http/ektron_xslt_exec.rb index 0cc67e0e06..40ee1b8563 100644 --- a/modules/exploits/windows/http/ektron_xslt_exec.rb +++ b/modules/exploits/windows/http/ektron_xslt_exec.rb @@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote SERVICE privileges. }, 'Author' => [ - 'Unknown', # Vulnerability discovery, http://webstersprodigy.net/ ? + 'Unknown', # Vulnerability discovery, maybe Richard Lundeen from http://webstersprodigy.net/ ? 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, @@ -97,7 +97,7 @@ return "#{fingerprint}"; } }) - if res and res.code == 200 and res.body =~ /#{fingerprint}/ and res.body !~ /Error/ + if res and res.code == 200 and res.body =~ /#{fingerprint}/ and res.body ! /Error/ return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe