diff --git a/modules/exploits/windows/http/manageengine_appmanager_exec.rb b/modules/exploits/windows/http/manageengine_appmanager_exec.rb index d500a85dc2..0f5b925f57 100644 --- a/modules/exploits/windows/http/manageengine_appmanager_exec.rb +++ b/modules/exploits/windows/http/manageengine_appmanager_exec.rb @@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote ['CVE', '2018-7890'], ['URL', 'https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/'] ], - 'DefaultOptions' => + 'DefaultOptions' => { 'WfsDelay' => 10, 'RPORT' => 9090 @@ -44,8 +44,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Targets' => [['Automatic', {}]], 'Privileged' => true, 'DisclosureDate' => 'Mar 7 2018', - 'DefaultTarget' => 0 - )) + 'DefaultTarget' => 0)) register_options( [