From c9b4a272e342ffe8ec0da12786e4ecb88673322a Mon Sep 17 00:00:00 2001 From: Roberto Soares Date: Fri, 24 Apr 2015 12:16:23 -0300 Subject: [PATCH] Changed fail_with output. --- modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb b/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb index 8e44854c50..a87def2e15 100644 --- a/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb +++ b/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb @@ -65,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote fail_with(Failure::UnexpectedReply, "#{peer} - Unable to deploy payload, server returned #{res.code}") end else - fail_with(Failure::Unknown, 'ERROR') + fail_with(Failure::Unknown, 'Server did not respond in an expected way') end print_status("#{peer} - Calling payload...")