From 3770f121fed575c19a8ec9a8c5b9efe50e0cab54 Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sun, 11 Nov 2018 08:07:37 +0100 Subject: [PATCH] Changing result parsing style Co-Authored-By: carmaa --- modules/exploits/windows/http/hp_imc_java_deserialize.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/hp_imc_java_deserialize.rb b/modules/exploits/windows/http/hp_imc_java_deserialize.rb index b429e812d1..9691c3ec13 100644 --- a/modules/exploits/windows/http/hp_imc_java_deserialize.rb +++ b/modules/exploits/windows/http/hp_imc_java_deserialize.rb @@ -65,7 +65,7 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET' }) - if res and res.code == 500 and res.body =~ /HPE Intelligent Management Center/ + if res && res.code == 500 && res.body.include?('HPE Intelligent Management Center') return Exploit::CheckCode::Appears end