diff --git a/modules/exploits/multi/misc/java_jmx_server.rb b/modules/exploits/multi/misc/java_jmx_server.rb index 3e73d6b6f4..49f831e91b 100644 --- a/modules/exploits/multi/misc/java_jmx_server.rb +++ b/modules/exploits/multi/misc/java_jmx_server.rb @@ -192,7 +192,6 @@ class Metasploit3 < Msf::Exploit::Remote return nil end - #answer = extract_object(return_value, 1) answer = extract_object(return_value.value[0]) if answer.nil? @@ -202,7 +201,6 @@ class Metasploit3 < Msf::Exploit::Remote case answer when 'javax.management.remote.rmi.RMIServerImpl_Stub' - #mbean_server = extract_unicast_ref(StringIO.new(return_value.contents[2].contents)) mbean_server = extract_unicast_ref(StringIO.new(return_value.value[1].contents)) else vprint_error("#{peer} - JMXRMI discovery returned unexpected object #{answer}")