From 7a89db508050e4290d321358dc0c16ac13e3c0fc Mon Sep 17 00:00:00 2001 From: Jack Heysel Date: Tue, 15 Oct 2024 09:21:07 -0700 Subject: [PATCH] Updated print statements --- .../exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb b/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb index 0eaa5e35c335..2823266f6859 100644 --- a/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb +++ b/modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb @@ -97,11 +97,11 @@ def initialize(info = {}) def check_magento etc_password = download_file('/etc/passwd') - vprint_status("Attempting to download /etc/passwd") + vprint_status('Attempting to download /etc/passwd') if etc_password.nil? CheckCode::Safe('Unable to download /etc/passwd via the Arbitrary File Read (CVE-2024-34102).') else - CheckCode::Vulnerable('Downloading /etc/passwd via the Arbitrary File Read (CVE-2024-34102) was successful.') + CheckCode::Vulnerable('Exploit precondition 1/3 met: Downloading /etc/passwd via the Arbitrary File Read (CVE-2024-34102) was successful.') end end