Skip to content

Commit e14c6af

Browse files
committed
Removed double 'Calling payload'.
1 parent 01efc97 commit e14c6af

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ def exploit
5959

6060
if res
6161
if res.code == 200 && res.body =~ /#{php_pagename}/
62-
print_good("#{peer} - Our payload is at: #{php_pagename}. Calling payload...")
62+
print_good("#{peer} - Our payload is at: #{php_pagename}.")
6363
register_files_for_cleanup(php_pagename)
6464
else
6565
fail_with(Failure::UnexpectedReply, "#{peer} - Unable to deploy payload, server returned #{res.code}")

0 commit comments

Comments
 (0)