Update msftidy to catch more potential URL vs PACKETSTORM warnings

Fix the affected modules
bug/bundler_fix
Jon Hart 2015-12-24 09:12:24 -08:00
parent 27a6aa0be1
commit 283cf5b869
No known key found for this signature in database
GPG Key ID: 2FA9F0A3AFA8E9D3
7 changed files with 7 additions and 7 deletions

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'BID', '25676'],
[ 'URL', 'http://packetstormsecurity.org/files/59347/boa-bypass.txt.html']
[ 'PACKETSTORM', '59347']
],
'DisclosureDate' => 'Sep 10 2007'))

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
['WPVDB', '8107'],
['URL', 'https://packetstormsecurity.com/files/132750/']
['PACKETSTORM', '132750']
],
'Author' =>
[

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '69352' ],
[ 'CVE', '2010-4335' ],
[ 'BID', '44852' ],
[ 'URL', 'http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt' ]
[ 'PACKETSTORM', '95847' ]
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'OSVDB', '83552' ],
[ 'BID', '54263' ],
[ 'URL', 'http://packetstormsecurity.org/files/118497/Nagios-XI-Network-Monitor-2011R1.9-OS-Command-Injection.html' ]
[ 'PACKETSTORM', '118497' ]
],
'Payload' =>
{

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '85881'],
['EDB', '21929'],
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html']
['PACKETSTORM', '117070']
],
'Platform' => %w{ linux php },
'Targets' =>

View File

@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '92198'],
['OSVDB', '92200'],
['URL', 'http://dl.packetstormsecurity.net/1304-exploits/miniweb-shelltraversal.txt']
['PACKETSTORM', '121168']
],
'Payload' =>
{

View File

@ -210,7 +210,7 @@ class Msftidy
warn("Please use 'US-CERT-VU' for '#{value}'")
elsif value =~ /^https:\/\/wpvulndb\.com\/vulnerabilities\//
warn("Please use 'WPVDB' for '#{value}'")
elsif value =~ /^http:\/\/packetstormsecurity\.com\/files\//
elsif value =~ /^https?:\/\/(?:[^\.]+\.)?packetstormsecurity\.(?:com|net|org)\//
warn("Please use 'PACKETSTORM' for '#{value}'")
end
end