diff --git a/modules/exploits/windows/misc/commvault_cmd_exec.rb b/modules/exploits/windows/misc/commvault_cmd_exec.rb index a5b546841d..7af4b96ef2 100644 --- a/modules/exploits/windows/misc/commvault_cmd_exec.rb +++ b/modules/exploits/windows/misc/commvault_cmd_exec.rb @@ -71,7 +71,7 @@ class MetasploitModule < Msf::Exploit::Remote psh = "powershell" idx = command.index(psh) command = command[(idx)..-1] - + #Build packet cmd_path = 'C:\Windows\System32\cmd.exe' msg_type = 9