Skip to content

Commit ab60e0b

Browse files
author
jvazquez-r7
committed
Fix print message
1 parent 24bad9c commit ab60e0b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/multi/sap/sap_soap_rfc_sxpg_call_system_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ def exploit
139139
if target.name =~ /Windows/
140140
linemax = datastore['PAYLOAD_SPLIT']
141141
vprint_status("#{rhost}:#{rport} - Using custom payload size of #{linemax}") if linemax != 250
142-
print_status("#{rhost}:#{rport} - Sending SOAP SXPG_COMMAND_EXECUTE request")
142+
print_status("#{rhost}:#{rport} - Sending SOAP SXPG_CALL_SYSTEM request")
143143
execute_cmdstager({ :delay => 0.35, :linemax => linemax })
144144
elsif target.name =~ /Linux/
145145
file = rand_text_alphanumeric(5)

0 commit comments

Comments
 (0)