diff --git a/lib/msf/core/exploit/remote/http/manage_engine_adaudit_plus/login.rb b/lib/msf/core/exploit/remote/http/manage_engine_adaudit_plus/login.rb index b9ebb55edd..aba9eb9143 100644 --- a/lib/msf/core/exploit/remote/http/manage_engine_adaudit_plus/login.rb +++ b/lib/msf/core/exploit/remote/http/manage_engine_adaudit_plus/login.rb @@ -70,7 +70,8 @@ module Msf::Exploit::Remote::HTTP::ManageEngineAdauditPlus::Login } end - # check if we have a new adapcsrf cookie with the expected format, which is different from the initial adapcsrf cookie format + # check if we have a new adapcsrf cookie with the expected format, which is different + # from the initial adapcsrf cookie format that we got before visiting the adaudit_plus_jump_to_js_uri URI. unless res_extra_cookies.code == 200 && res_extra_cookies.headers.include?('Set-Cookie') && res_extra_cookies.get_cookies =~ /adapcsrf=[a-f0-9]{128}/ return { 'status' => adaudit_plus_status::UNEXPECTED_REPLY,