New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix extraneous whitespace in check output #10971

Merged
merged 2 commits into from Nov 16, 2018

Conversation

Projects
None yet
4 participants
@wvu-r7
Contributor

wvu-r7 commented Nov 16, 2018

Death to the peer gods.

msf5 exploit(unix/local/exim_perl_startup) > check

[!] SESSION may not be compatible with this module.
[*]  The target is not exploitable.
msf5 exploit(unix/local/exim_perl_startup) >

#6526, #6907

Fix extraneous whitespace in check output
Death to the peer gods.

@busterb busterb self-assigned this Nov 16, 2018

Ensure peer_msg falls back on an empty string
Co-Authored-By: wvu-r7 <wvu-r7@users.noreply.github.com>

@busterb busterb merged commit 277ed37 into rapid7:master Nov 16, 2018

1 of 3 checks passed

Metasploit Automation - Sanity Test Execution Failed to pass tests.
Details
continuous-integration/travis-ci/pr The Travis CI build is in progress
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details

busterb added a commit that referenced this pull request Nov 16, 2018

msjenkins-r7 added a commit that referenced this pull request Nov 16, 2018

@busterb

This comment has been minimized.

Contributor

busterb commented Nov 16, 2018

Release Notes

This fixes a formatting error when printing messages while running the check command from local exploit modules.

@wvu-r7

This comment has been minimized.

Contributor

wvu-r7 commented Nov 16, 2018

Thanks, @busterb && @bcoles!

@wvu-r7 wvu-r7 deleted the wvu-r7:bug/check branch Nov 16, 2018

@gdavidson-r7 gdavidson-r7 added the rn-fix label Dec 3, 2018

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment