Update msftidy to catch more potential URL vs PACKETSTORM warnings

Fix the affected modules
bug/bundler_fix
Jon Hart 2015-12-24 09:12:24 -08:00
parent 27a6aa0be1
commit 283cf5b869
No known key found for this signature in database
GPG Key ID: 2FA9F0A3AFA8E9D3
7 changed files with 7 additions and 7 deletions

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
'References' => 'References' =>
[ [
[ 'BID', '25676'], [ 'BID', '25676'],
[ 'URL', 'http://packetstormsecurity.org/files/59347/boa-bypass.txt.html'] [ 'PACKETSTORM', '59347']
], ],
'DisclosureDate' => 'Sep 10 2007')) 'DisclosureDate' => 'Sep 10 2007'))

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
'References' => 'References' =>
[ [
['WPVDB', '8107'], ['WPVDB', '8107'],
['URL', 'https://packetstormsecurity.com/files/132750/'] ['PACKETSTORM', '132750']
], ],
'Author' => 'Author' =>
[ [

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '69352' ], [ 'OSVDB', '69352' ],
[ 'CVE', '2010-4335' ], [ 'CVE', '2010-4335' ],
[ 'BID', '44852' ], [ 'BID', '44852' ],
[ 'URL', 'http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt' ] [ 'PACKETSTORM', '95847' ]
], ],
'Privileged' => false, 'Privileged' => false,
'Platform' => ['php'], 'Platform' => ['php'],

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
[ 'OSVDB', '83552' ], [ 'OSVDB', '83552' ],
[ 'BID', '54263' ], [ 'BID', '54263' ],
[ 'URL', 'http://packetstormsecurity.org/files/118497/Nagios-XI-Network-Monitor-2011R1.9-OS-Command-Injection.html' ] [ 'PACKETSTORM', '118497' ]
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
['OSVDB', '85881'], ['OSVDB', '85881'],
['EDB', '21929'], ['EDB', '21929'],
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html'] ['PACKETSTORM', '117070']
], ],
'Platform' => %w{ linux php }, 'Platform' => %w{ linux php },
'Targets' => 'Targets' =>

View File

@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
['OSVDB', '92198'], ['OSVDB', '92198'],
['OSVDB', '92200'], ['OSVDB', '92200'],
['URL', 'http://dl.packetstormsecurity.net/1304-exploits/miniweb-shelltraversal.txt'] ['PACKETSTORM', '121168']
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -210,7 +210,7 @@ class Msftidy
warn("Please use 'US-CERT-VU' for '#{value}'") warn("Please use 'US-CERT-VU' for '#{value}'")
elsif value =~ /^https:\/\/wpvulndb\.com\/vulnerabilities\// elsif value =~ /^https:\/\/wpvulndb\.com\/vulnerabilities\//
warn("Please use 'WPVDB' for '#{value}'") warn("Please use 'WPVDB' for '#{value}'")
elsif value =~ /^http:\/\/packetstormsecurity\.com\/files\// elsif value =~ /^https?:\/\/(?:[^\.]+\.)?packetstormsecurity\.(?:com|net|org)\//
warn("Please use 'PACKETSTORM' for '#{value}'") warn("Please use 'PACKETSTORM' for '#{value}'")
end end
end end