diff --git a/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb b/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb index 0eaa5e35c335..2823266f6859 100644 --- a/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb +++ b/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb @@ -97,11 +97,11 @@ def initialize(info = {}) def check_magento etc_password = download_file('/etc/passwd') - vprint_status("Attempting to download /etc/passwd") + vprint_status('Attempting to download /etc/passwd') if etc_password.nil? CheckCode::Safe('Unable to download /etc/passwd via the Arbitrary File Read (CVE-2024-34102).') else - CheckCode::Vulnerable('Downloading /etc/passwd via the Arbitrary File Read (CVE-2024-34102) was successful.') + CheckCode::Vulnerable('Exploit precondition 1/3 met: Downloading /etc/passwd via the Arbitrary File Read (CVE-2024-34102) was successful.') end end