metadata formatting, and a little res gotcha

unstable
sinn3r 2012-10-08 15:00:51 -05:00
parent cdf8956a10
commit abb4bdd408
1 changed files with 7 additions and 6 deletions

View File

@ -24,7 +24,8 @@ class Metasploit3 < Msf::Exploit::Remote
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
},
'Author' => [
'Author' =>
[
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
'method' => 'GET'
}, 20)
if (!res or res.code != 200)
if (!res or (res and res.code != 200))
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
return
end