diff --git a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb index 5edea8acdf..2b7659888a 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb @@ -11,16 +11,16 @@ class Metasploit3 < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report - + def initialize(info = {}) super(update_info(info, 'Name' => 'Supermicro Onboard IPMI Port 49152 Sensitive File Exposure', 'Description' => %q{ - This module abuses a file exposure vulnerability accessible through the web interface + This module abuses a file exposure vulnerability accessible through the web interface on port 49152 of Supermicro Onboard IPMI controllers. The vulnerability allows an attacker to obtain detailed device information and download data files containing the clear-text - usernames and passwords for the controller. In May of 2014, at least 30,000 unique IPs + usernames and passwords for the controller. In May of 2014, at least 30,000 unique IPs were exposed to the internet with this vulnerability. }, 'Author' => @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Auxiliary "method" => "GET" }) - if res and res.code == 200 and res.body.to_s =~ /supermicro/i + if res && res.code == 200 && res.body.to_s =~ /supermicro/i path = store_loot( 'supermicro.ipmi.devicexml', 'text/xml', @@ -85,7 +85,7 @@ class Metasploit3 < Msf::Auxiliary next unless res - unless res.code == 200 and res.body.length > 0 + unless res.code == 200 && res.body.length > 0 vprint_status("#{peer} - Request for #{uri} resulted in #{res.code}") next end diff --git a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb index b8379cc162..af35678d44 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb @@ -111,7 +111,6 @@ class Metasploit3 < Msf::Auxiliary end def run_host(ip) - print_status("#{peer} - Checking if it's a #{APP_NAME}....") if is_supermicro? print_good("#{peer} - Check successful")