Update note about staging payloads over HTTPS
parent
b2c21c754f
commit
a1e6d4d19a
|
@ -114,7 +114,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
fail_with(Failure::NotVulnerable, 'Set ForceExploit to override')
|
||||
end
|
||||
|
||||
# NOTE: Staging payloads over HTTPS doesn't work (yet?)
|
||||
# NOTE: Jenkins/Groovy/Ivy uses HTTP unconditionally, so we can't use HTTPS
|
||||
# HACK: Both HttpClient and HttpServer use datastore['SSL']
|
||||
ssl = datastore['SSL']
|
||||
datastore['SSL'] = false
|
||||
|
|
Loading…
Reference in New Issue