diff --git a/modules/exploits/windows/mssql/mssql_payload.rb b/modules/exploits/windows/mssql/mssql_payload.rb index 36ace61e6f..952ea7dae1 100644 --- a/modules/exploits/windows/mssql/mssql_payload.rb +++ b/modules/exploits/windows/mssql/mssql_payload.rb @@ -70,15 +70,6 @@ class MetasploitModule < Msf::Exploit::Remote end def check - if session - set_session(session.client) - end - - unless session || mssql_login_datastore - vprint_status("Invalid SQL Server credentials") - return Exploit::CheckCode::Detected - end - if session set_session(session.client) else @@ -105,14 +96,13 @@ class MetasploitModule < Msf::Exploit::Remote end def exploit - if session set_session(session.client) - end - - unless session || mssql_login_datastore - print_status("Invalid SQL Server credentials") - return + else + unless mssql_login_datastore + print_status("Invalid SQL Server credentials") + return + end end method = datastore['METHOD'].downcase