diff --git a/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb b/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb index 3c716dbb0c..1be78b709a 100644 --- a/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb +++ b/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb @@ -102,7 +102,7 @@ class Metasploit3 < Msf::Exploit::Remote print_status("#{@peer} - Retrieving an initial JSESSIONID") res = send_request_cgi( 'uri' => "#{@uri}servlet/Main", - 'method' => 'POST', + 'method' => 'POST' ) if res and res.code == 200 and res.headers['Set-Cookie'] =~ /JSESSIONID=([0-9A-F]*);/