From 28e661e2040a22db4851c51810237eb33ccbc83a Mon Sep 17 00:00:00 2001 From: William Vu Date: Tue, 28 Apr 2015 14:19:48 -0500 Subject: [PATCH] Fix false positive in POODLE scanner If SSL is false somehow. --- modules/auxiliary/scanner/http/ssl_version.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/scanner/http/ssl_version.rb b/modules/auxiliary/scanner/http/ssl_version.rb index 9dbca61872..988dfd48b9 100644 --- a/modules/auxiliary/scanner/http/ssl_version.rb +++ b/modules/auxiliary/scanner/http/ssl_version.rb @@ -59,7 +59,7 @@ class Metasploit3 < Msf::Auxiliary vprint_status("#{peer} connected and fingerprinted: #{fp}") # TODO: Interrogate the connection itself to see what version # was used. Where that actually lives is eluding me. :/ - if datastore['SSLVersion'] == 'SSL3' + if datastore['SSL'] && datastore['SSLVersion'] == 'SSL3' print_good("#{peer} accepts SSLv3") report_poodle_vuln(ip) end