Skip to content

Commit fc3094e

Browse files
committed
Syntax changes
Fixed some more syntax - failures
1 parent 321eb45 commit fc3094e

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ def on_new_session(client)
6767
client.fs.file.rm(f)
6868
print_good("#{peer} - #{f} removed to stay ninja")
6969
rescue
70-
print_error("#{peer} - Unable to remove #{f}")
70+
fail_with(Failure::Unknown, "#{peer} - Unable to remove #{f}")
7171
end
7272
end
7373
end
@@ -96,8 +96,7 @@ def exploit
9696
})
9797

9898
if res.nil? || res.headers['Location'] =~ /action=Login/ || res.get_cookies.empty?
99-
print_error("#{peer} - Login failed with \"#{username}:#{password}\"")
100-
return
99+
fail_with(Failure::NoAccess, "#{peer} - Login failed with \"#{username}:#{password}\"")
101100
end
102101

103102
if res.get_cookies =~ /PHPSESSID=([A-Za-z0-9]*); path/
@@ -129,9 +128,8 @@ def exploit
129128
'data' => data
130129
})
131130

132-
if not res || res.code != 200
133-
print_error("#{peer} - Exploit failed: #{res.code}")
134-
return
131+
unless res && res.code == 200
132+
fail_with(Failure::Unknown, "#{peer} - Exploit failed: #{res.code}")
135133
end
136134

137135
print_status("#{peer} - Executing the payload")
@@ -148,7 +146,7 @@ def exploit
148146
if res && res.code == 200
149147
print_good("#{peer} - Payload Executed Successfuly: #{res.code}")
150148
else
151-
print_error("#{peer} - Payload execution failed: #{res.code}")
149+
fail_with(Failure::Unknown, "#{peer} - Payload execution failed: #{res.code}")
152150
end
153151

154152
end

0 commit comments

Comments
 (0)