Land #7114, Fix typo in browser_exploit_server

the commit.
bug/bundler_fix
thao doan 2016-07-21 10:45:58 -07:00
commit a1e51ffb0c
1 changed files with 1 additions and 1 deletions

View File

@ -586,7 +586,7 @@ module Msf
vprint_status("Serving exploit to user #{cli.peerhost} with tag #{tag}") vprint_status("Serving exploit to user #{cli.peerhost} with tag #{tag}")
profile = browser_profile[tag] profile = browser_profile[tag]
if profile.nil? if profile.nil?
print_status("Browsing visiting directly to the exploit URL is forbidden.") print_status("Browser visiting directly to the exploit URL is forbidden.")
send_not_found(cli) send_not_found(cli)
elsif profile[:tried] && !datastore['Retries'] elsif profile[:tried] && !datastore['Retries']
print_status("Target #{cli.peerhost} with tag \"#{tag}\" wants to retry the module, not allowed.") print_status("Target #{cli.peerhost} with tag \"#{tag}\" wants to retry the module, not allowed.")