diff --git a/monkey/infection_monkey/exploit/drupal.py b/monkey/infection_monkey/exploit/drupal.py index a5d162167..7f88ed07a 100644 --- a/monkey/infection_monkey/exploit/drupal.py +++ b/monkey/infection_monkey/exploit/drupal.py @@ -93,7 +93,7 @@ class DrupalExploiter(WebRCE): json=payload, headers={"Content-Type": "application/hal+json"}, verify=False) - + if is_response_cached(r): LOG.info(f'Exploiting {url} returned cache HIT, may have failed') @@ -110,7 +110,7 @@ class DrupalExploiter(WebRCE): :return: vulnerable URL to exploit """ return self.vulnerable_urls.pop() - + def are_vulnerable_urls_sufficient(self): """ For the Drupal exploit, 5 distinct URLs are needed to perform the full attack.