diff --git a/modules/exploits/windows/winrm/winrm_script_exec.rb b/modules/exploits/windows/winrm/winrm_script_exec.rb index 492c40e190..6f280b9d45 100644 --- a/modules/exploits/windows/winrm/winrm_script_exec.rb +++ b/modules/exploits/windows/winrm/winrm_script_exec.rb @@ -80,7 +80,7 @@ class MetasploitModule < Msf::Exploit::Remote commands.each do |command| if command.include? "cscript" streams = winrm_run_cmd_hanging(command) - print_status streams.inspect + print_status(streams.inspect) unless streams.nil? elsif command.include? "del %TEMP%" next else