diff --git a/modules/exploits/multi/misc/java_jdwp_debugger.rb b/modules/exploits/multi/misc/java_jdwp_debugger.rb index 0f07258835..871bd7be4a 100644 --- a/modules/exploits/multi/misc/java_jdwp_debugger.rb +++ b/modules/exploits/multi/misc/java_jdwp_debugger.rb @@ -173,7 +173,7 @@ class Metasploit3 < Msf::Exploit::Remote # Reads packet response for JDWP protocol def read_reply(timeout = default_timeout) - response = sock.get_once(-1, timeout) + response = sock.get(timeout) fail_with(Failure::TimeoutExpired, "#{peer} - Not received response") unless response pktlen, id, flags, errcode = response.unpack('NNCn') response.slice!(0..10)