metadata formatting, and a little res gotcha
parent
cdf8956a10
commit
abb4bdd408
|
@ -24,7 +24,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP
|
||||
Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.
|
||||
},
|
||||
'Author' => [
|
||||
'Author' =>
|
||||
[
|
||||
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
|
@ -173,7 +174,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'method' => 'GET'
|
||||
}, 20)
|
||||
|
||||
if (!res or res.code != 200)
|
||||
if (!res or (res and res.code != 200))
|
||||
print_error("#{@peer} - Execution failed on #{payload_url} [No Response]")
|
||||
return
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue