Do unless instead "if !" to follow the Ruby guideline
parent
b5284375a7
commit
99a573a013
|
@ -133,7 +133,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing user supplied command")
|
print_status("Executing user supplied command")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
|
@ -186,7 +186,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing user supplied command")
|
print_status("Executing user supplied command")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
|
@ -149,7 +149,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing command '#{datastore['CMD']}'")
|
print_status("Executing command '#{datastore['CMD']}'")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
|
@ -92,7 +92,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing command '#{datastore['CMD']}'")
|
print_status("Executing command '#{datastore['CMD']}'")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
|
@ -110,7 +110,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing command '#{datastore['CMD']}'")
|
print_status("Executing command '#{datastore['CMD']}'")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
|
@ -93,7 +93,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
|
||||||
if !datastore['CMD'].blank?
|
unless datastore['CMD'].blank?
|
||||||
print_status("Executing command '#{datastore['CMD']}'")
|
print_status("Executing command '#{datastore['CMD']}'")
|
||||||
execute_command(datastore['CMD'])
|
execute_command(datastore['CMD'])
|
||||||
return
|
return
|
||||||
|
|
Loading…
Reference in New Issue