diff --git a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb index 2003a9c286..18de141bbd 100644 --- a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb +++ b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb @@ -151,16 +151,16 @@ class MetasploitModule < Msf::Auxiliary } ) - vmessage = "#{peer} - Checking #{uri} [#{res.code}]" + vmessage = "#{peer} - Checking #{uri}" if res && res.body.include?('Requested Range Not Satisfiable') - vprint_status("#{vmessage} - Vulnerable") + vprint_status("#{vmessage} [#{res.code}] - Vulnerable") target_uri.path = uri # Needed for the DoS attack return Exploit::CheckCode::Vulnerable elsif res && res.body.include?('The request has an invalid header name') - vprint_status("#{vmessage} - Safe") + vprint_status("#{vmessage} [#{res.code}] - Safe") return Exploit::CheckCode::Safe else