diff --git a/modules/exploits/windows/http/hp_imc_java_deserialize.rb b/modules/exploits/windows/http/hp_imc_java_deserialize.rb index b429e812d1..9691c3ec13 100644 --- a/modules/exploits/windows/http/hp_imc_java_deserialize.rb +++ b/modules/exploits/windows/http/hp_imc_java_deserialize.rb @@ -65,7 +65,7 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET' }) - if res and res.code == 500 and res.body =~ /HPE Intelligent Management Center/ + if res && res.code == 500 && res.body.include?('HPE Intelligent Management Center') return Exploit::CheckCode::Appears end