From d7bf7bc2ea83387793da088c0da3f0eb01980980 Mon Sep 17 00:00:00 2001 From: Stephen Fewer <122022313+sfewer-r7@users.noreply.github.com> Date: Wed, 13 Mar 2024 09:12:56 +0000 Subject: [PATCH] Use Failure::NoAccess as a better failure error, as we are trying to login Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com> --- .../multi/http/jetbrains_teamcity_rce_cve_2024_27198.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2024_27198.rb b/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2024_27198.rb index 665546330d..a37f256596 100644 --- a/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2024_27198.rb +++ b/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2024_27198.rb @@ -231,7 +231,7 @@ class MetasploitModule < Msf::Exploit::Remote # A failed login attempt will return in a 401. We expect a 302 redirect upon success. if res&.code == 401 - fail_with(Failure::UnexpectedReply, 'Failed to login with new admin user credentials.') + fail_with(Failure::NoAccess, 'Failed to login with new admin user credentials.') end else unless res&.code == 200