diff --git a/monkey/infection_monkey/exploit/drupal.py b/monkey/infection_monkey/exploit/drupal.py
index a5d162167..7f88ed07a 100644
--- a/monkey/infection_monkey/exploit/drupal.py
+++ b/monkey/infection_monkey/exploit/drupal.py
@@ -93,7 +93,7 @@ class DrupalExploiter(WebRCE):
                          json=payload,
                          headers={"Content-Type": "application/hal+json"},
                          verify=False)
-        
+
         if is_response_cached(r):
             LOG.info(f'Exploiting {url} returned cache HIT, may have failed')
 
@@ -110,7 +110,7 @@ class DrupalExploiter(WebRCE):
         :return: vulnerable URL to exploit
         """
         return self.vulnerable_urls.pop()
-    
+
     def are_vulnerable_urls_sufficient(self):
         """
         For the Drupal exploit, 5 distinct URLs are needed to perform the full attack.