From 467e0877f57a38e088caac23de1d478036a8a134 Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sun, 18 Nov 2018 12:40:09 +0000 Subject: [PATCH] res.code --- modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb index 2003a9c286..18de141bbd 100644 --- a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb +++ b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb @@ -151,16 +151,16 @@ class MetasploitModule < Msf::Auxiliary } ) - vmessage = "#{peer} - Checking #{uri} [#{res.code}]" + vmessage = "#{peer} - Checking #{uri}" if res && res.body.include?('Requested Range Not Satisfiable') - vprint_status("#{vmessage} - Vulnerable") + vprint_status("#{vmessage} [#{res.code}] - Vulnerable") target_uri.path = uri # Needed for the DoS attack return Exploit::CheckCode::Vulnerable elsif res && res.body.include?('The request has an invalid header name') - vprint_status("#{vmessage} - Safe") + vprint_status("#{vmessage} [#{res.code}] - Safe") return Exploit::CheckCode::Safe else