Update msftidy to catch more potential URL vs PACKETSTORM warnings
Fix the affected modulesbug/bundler_fix
parent
27a6aa0be1
commit
283cf5b869
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'BID', '25676'],
|
[ 'BID', '25676'],
|
||||||
[ 'URL', 'http://packetstormsecurity.org/files/59347/boa-bypass.txt.html']
|
[ 'PACKETSTORM', '59347']
|
||||||
],
|
],
|
||||||
'DisclosureDate' => 'Sep 10 2007'))
|
'DisclosureDate' => 'Sep 10 2007'))
|
||||||
|
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
['WPVDB', '8107'],
|
['WPVDB', '8107'],
|
||||||
['URL', 'https://packetstormsecurity.com/files/132750/']
|
['PACKETSTORM', '132750']
|
||||||
],
|
],
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[ 'OSVDB', '69352' ],
|
[ 'OSVDB', '69352' ],
|
||||||
[ 'CVE', '2010-4335' ],
|
[ 'CVE', '2010-4335' ],
|
||||||
[ 'BID', '44852' ],
|
[ 'BID', '44852' ],
|
||||||
[ 'URL', 'http://packetstormsecurity.org/files/view/95847/burnedcake.py.txt' ]
|
[ 'PACKETSTORM', '95847' ]
|
||||||
],
|
],
|
||||||
'Privileged' => false,
|
'Privileged' => false,
|
||||||
'Platform' => ['php'],
|
'Platform' => ['php'],
|
||||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[
|
[
|
||||||
[ 'OSVDB', '83552' ],
|
[ 'OSVDB', '83552' ],
|
||||||
[ 'BID', '54263' ],
|
[ 'BID', '54263' ],
|
||||||
[ 'URL', 'http://packetstormsecurity.org/files/118497/Nagios-XI-Network-Monitor-2011R1.9-OS-Command-Injection.html' ]
|
[ 'PACKETSTORM', '118497' ]
|
||||||
],
|
],
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
{
|
{
|
||||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[
|
[
|
||||||
['OSVDB', '85881'],
|
['OSVDB', '85881'],
|
||||||
['EDB', '21929'],
|
['EDB', '21929'],
|
||||||
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html']
|
['PACKETSTORM', '117070']
|
||||||
],
|
],
|
||||||
'Platform' => %w{ linux php },
|
'Platform' => %w{ linux php },
|
||||||
'Targets' =>
|
'Targets' =>
|
||||||
|
|
|
@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[
|
[
|
||||||
['OSVDB', '92198'],
|
['OSVDB', '92198'],
|
||||||
['OSVDB', '92200'],
|
['OSVDB', '92200'],
|
||||||
['URL', 'http://dl.packetstormsecurity.net/1304-exploits/miniweb-shelltraversal.txt']
|
['PACKETSTORM', '121168']
|
||||||
],
|
],
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
{
|
{
|
||||||
|
|
|
@ -210,7 +210,7 @@ class Msftidy
|
||||||
warn("Please use 'US-CERT-VU' for '#{value}'")
|
warn("Please use 'US-CERT-VU' for '#{value}'")
|
||||||
elsif value =~ /^https:\/\/wpvulndb\.com\/vulnerabilities\//
|
elsif value =~ /^https:\/\/wpvulndb\.com\/vulnerabilities\//
|
||||||
warn("Please use 'WPVDB' for '#{value}'")
|
warn("Please use 'WPVDB' for '#{value}'")
|
||||||
elsif value =~ /^http:\/\/packetstormsecurity\.com\/files\//
|
elsif value =~ /^https?:\/\/(?:[^\.]+\.)?packetstormsecurity\.(?:com|net|org)\//
|
||||||
warn("Please use 'PACKETSTORM' for '#{value}'")
|
warn("Please use 'PACKETSTORM' for '#{value}'")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue