Skip to content

Commit 491ea81

Browse files
author
jvazquez-r7
committed
Fix calls to fail_with from mixins
1 parent a815d92 commit 491ea81

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

lib/msf/core/exploit/http/client.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ def validate_fingerprint()
126126
opts[:pattern].each do |re|
127127
if not re.match(info)
128128
err = "The target server fingerprint \"#{info}\" does not match \"#{re.to_s}\", use 'set FingerprintCheck false' to disable this check."
129-
fail_with(Msf::Exploit::Failure::NotFound, err)
129+
fail_with(Failure::NotFound, err)
130130
end
131131
end
132132
end

lib/msf/core/exploit/mssql_sqli.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ def mssql_query(sqla, doprint=false)
144144
if (datastore['METHOD'] == 'GET')
145145

146146
unless datastore['GET_PATH'].index("[SQLi]")
147-
fail_with(Exploit::Failure::NoTarget, "The SQL injection parameter was not specified in the GET path")
147+
fail_with(Failure::NoTarget, "The SQL injection parameter was not specified in the GET path")
148148
end
149149

150150
uri = datastore['GET_PATH'].gsub("[SQLi]", Rex::Text.uri_encode(sqla))
@@ -160,7 +160,7 @@ def mssql_query(sqla, doprint=false)
160160
else
161161

162162
unless datastore['DATA'].index("[SQLi]")
163-
fail_with(Exploit::Failure::NoTarget, "The SQL injection parameter was not specified in the POST data")
163+
fail_with(Failure::NoTarget, "The SQL injection parameter was not specified in the POST data")
164164
end
165165

166166
post_data = datastore['DATA'].gsub("[SQLi]", Rex::Text.uri_encode(sqla))

0 commit comments

Comments
 (0)