diff --git a/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb b/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb index 94bcf89c3b..df9d2a2633 100644 --- a/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb +++ b/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb @@ -4,9 +4,9 @@ ## class MetasploitModule < Msf::Auxiliary - prepend Msf::Exploit::Remote::AutoCheck include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClient + prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( @@ -54,7 +54,9 @@ class MetasploitModule < Msf::Auxiliary return Exploit::CheckCode::Unknown("#{peer} - Could not connect to web service - no response") if res.nil? return Exploit::CheckCode::Safe("#{peer} - Check URI Path, unexpected HTTP response code: #{res.code}") unless res.code == 200 - Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard' + return Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard' + + Exploit::CheckCode::Safe("#{peer} - Jasmin login page not found") end def run diff --git a/modules/auxiliary/gather/jasmin_ransomware_sqli.rb b/modules/auxiliary/gather/jasmin_ransomware_sqli.rb index 38d3612f6e..8c6ac42478 100644 --- a/modules/auxiliary/gather/jasmin_ransomware_sqli.rb +++ b/modules/auxiliary/gather/jasmin_ransomware_sqli.rb @@ -56,7 +56,9 @@ class MetasploitModule < Msf::Auxiliary return Exploit::CheckCode::Unknown("#{peer} - Could not connect to web service - no response") if res.nil? return Exploit::CheckCode::Safe("#{peer} - Check URI Path, unexpected HTTP response code: #{res.code}") unless res.code == 200 - Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard' + return Exploit::CheckCode::Detected('Jasmin Login page detected') if res.body.include? 'Jasmin Dashboard' + + Exploit::CheckCode::Safe("#{peer} - Jasmin login page not found") end def run