diff --git a/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb b/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb
index 94bcf89c3b..df9d2a2633 100644
--- a/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb
+++ b/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb
@@ -4,9 +4,9 @@
##
class MetasploitModule < Msf::Auxiliary
- prepend Msf::Exploit::Remote::AutoCheck
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::HttpClient
+ prepend Msf::Exploit::Remote::AutoCheck
def initialize(info = {})
super(
@@ -54,7 +54,9 @@ class MetasploitModule < Msf::Auxiliary
return Exploit::CheckCode::Unknown("#{peer} - Could not connect to web service - no response") if res.nil?
return Exploit::CheckCode::Safe("#{peer} - Check URI Path, unexpected HTTP response code: #{res.code}") unless res.code == 200
- Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? '
Jasmin Dashboard'
+ return Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard'
+
+ Exploit::CheckCode::Safe("#{peer} - Jasmin login page not found")
end
def run
diff --git a/modules/auxiliary/gather/jasmin_ransomware_sqli.rb b/modules/auxiliary/gather/jasmin_ransomware_sqli.rb
index 38d3612f6e..8c6ac42478 100644
--- a/modules/auxiliary/gather/jasmin_ransomware_sqli.rb
+++ b/modules/auxiliary/gather/jasmin_ransomware_sqli.rb
@@ -56,7 +56,9 @@ class MetasploitModule < Msf::Auxiliary
return Exploit::CheckCode::Unknown("#{peer} - Could not connect to web service - no response") if res.nil?
return Exploit::CheckCode::Safe("#{peer} - Check URI Path, unexpected HTTP response code: #{res.code}") unless res.code == 200
- Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard'
+ return Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard'
+
+ Exploit::CheckCode::Safe("#{peer} - Jasmin login page not found")
end
def run