We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents af90c64 + d04fd3b commit 79b95aaCopy full SHA for 79b95aa
modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb
@@ -102,9 +102,9 @@ def exploit
102
if res.get_cookies =~ /PHPSESSID=([A-Za-z0-9]*); path/
103
session_id = $1
104
elsif res.get_cookies =~ /PHPSESSID=([A-Za-z0-9]*);/
105
- session_id = $1
106
- else
107
- fail_with(Failure::NoAccess, "#{peer} - Login failed with \"#{username}:#{password}\" (No session ID)")
+ session_id = $1
+ else
+ fail_with(Failure::NoAccess, "#{peer} - Login failed with \"#{username}:#{password}\" (No session ID)")
108
end
109
110
print_status("#{peer} - Login successful with #{username}:#{password}")
0 commit comments