diff --git a/modules/exploits/unix/webapp/vbulletin_unserialize.rb b/modules/exploits/unix/webapp/vbulletin_unserialize.rb index 33f30826f7..1360ba0e5c 100644 --- a/modules/exploits/unix/webapp/vbulletin_unserialize.rb +++ b/modules/exploits/unix/webapp/vbulletin_unserialize.rb @@ -46,8 +46,8 @@ class Metasploit3 < Msf::Exploit::Remote end def check - res = send_request_cgi({ 'uri' => '/' }) - if (res && res.body =~ /Version 5.1./ && res.body =~ /Copyright © 2015 vBulletin Solutions, Inc./) + res = send_request_cgi({ 'uri' => target_uri.path }) + if (res && res.body.include?("Version 5.1.") && res.body.include?('Copyright © 2015 vBulletin Solutions, Inc.')) return Exploit::CheckCode::Appears else return Exploit::CheckCode::Unknown