From adfacfbed1e0d2933b7d82e6061baa72ea5322f6 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 24 Sep 2013 15:08:48 -0500 Subject: [PATCH] Do not fail_with on method used from check --- modules/exploits/unix/webapp/zeroshell_exec.rb | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/zeroshell_exec.rb b/modules/exploits/unix/webapp/zeroshell_exec.rb index d5248e82f5..7c291ea823 100644 --- a/modules/exploits/unix/webapp/zeroshell_exec.rb +++ b/modules/exploits/unix/webapp/zeroshell_exec.rb @@ -99,7 +99,7 @@ class Metasploit3 < Msf::Exploit::Remote print_status("#{peer} - Password retrieved [ #{pass} ]") return pass else - fail_with(Failure::Unknown, "#{peer} - Retrieving password failed!") + return nil end end @@ -130,6 +130,10 @@ class Metasploit3 < Msf::Exploit::Remote def execute_command(cmd, opts) admin_password = password + if admin_password.nil? + fail_with(Failure::Unknown, "#{peer} - Retrieving password failed!") + end + session = login(admin_password) scriptname = rand_text_alphanumeric(8)