commit
a1e51ffb0c
|
@ -586,7 +586,7 @@ module Msf
|
||||||
vprint_status("Serving exploit to user #{cli.peerhost} with tag #{tag}")
|
vprint_status("Serving exploit to user #{cli.peerhost} with tag #{tag}")
|
||||||
profile = browser_profile[tag]
|
profile = browser_profile[tag]
|
||||||
if profile.nil?
|
if profile.nil?
|
||||||
print_status("Browsing visiting directly to the exploit URL is forbidden.")
|
print_status("Browser visiting directly to the exploit URL is forbidden.")
|
||||||
send_not_found(cli)
|
send_not_found(cli)
|
||||||
elsif profile[:tried] && !datastore['Retries']
|
elsif profile[:tried] && !datastore['Retries']
|
||||||
print_status("Target #{cli.peerhost} with tag \"#{tag}\" wants to retry the module, not allowed.")
|
print_status("Target #{cli.peerhost} with tag \"#{tag}\" wants to retry the module, not allowed.")
|
||||||
|
|
Loading…
Reference in New Issue