From 2bec5c425f92b5cc8f50c068e8cc823d84263cfc Mon Sep 17 00:00:00 2001 From: Jake Baines Date: Fri, 25 Feb 2022 08:32:06 -0800 Subject: [PATCH] Change CheckCode to Appears --- modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb b/modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb index 2d5db37590..0a2cc8967c 100644 --- a/modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb +++ b/modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb @@ -122,7 +122,7 @@ class MetasploitModule < Msf::Exploit::Remote return CheckCode::Safe('The target did not respond with a 200 OK or 500 error') unless (res.code == 200 || res.code == 500) # Some cameras are not vulnerable and still respond 500. We can weed them out by making - # the remote target sleep and use a low timeout. This might not be good for low latency targets + # the remote target sleep and use a low timeout. This might not be good for high latency targets # or for people using Metasploit as a vulnerability scanner... but it's better than flagging all # 500 responses as vulnerable. payload = '$(sleep 20)' @@ -132,7 +132,7 @@ class MetasploitModule < Msf::Exploit::Remote 'data' => payload }, 10) - return CheckCode::Vulnerable('It appears the target executed the provided sleep command.') unless res + return CheckCode::Appears('It appears the target executed the provided sleep command.') unless res CheckCode::Safe('The target did not execute the provided sleep command.') end