diff --git a/monkey/infection_monkey/exploit/log4shell.py b/monkey/infection_monkey/exploit/log4shell.py index af28b66e2..f970a35c7 100644 --- a/monkey/infection_monkey/exploit/log4shell.py +++ b/monkey/infection_monkey/exploit/log4shell.py @@ -159,7 +159,6 @@ class Log4ShellExploiter(WebRCE): "port": port, } self.exploit_info["vulnerable_urls"].append(url) - self.exploit_result.propagation_success = True def _wait_for_victim(self) -> bool: victim_called_back = self._wait_for_victim_to_download_java_bytecode() @@ -188,6 +187,7 @@ class Log4ShellExploiter(WebRCE): while not timer.is_expired(): if self._agent_http_server_thread.downloads > 0: + self.exploit_result.propagation_success = True break # TODO: if the http server got an error we're waiting for nothing here