more whitespace fixes
git-svn-id: file:///home/svn/framework3/trunk@9626 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
d4c558b0d0
commit
2ab5983e2a
|
@ -25,24 +25,25 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Version' => '$Revision$',
|
||||
'Description' => 'This module exploits a nginx source code disclosure/download vulnerability.',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2010-2263'],
|
||||
['OSVDB', '65531'],
|
||||
['BID', '40760'],
|
||||
],
|
||||
[
|
||||
['CVE', '2010-2263'],
|
||||
['OSVDB', '65531'],
|
||||
['BID', '40760'],
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
'Alligator Security Team',
|
||||
'Tiago Ferreira <tiago.ccna[at]gmail.com>',
|
||||
],
|
||||
[
|
||||
'Alligator Security Team',
|
||||
'Tiago Ferreira <tiago.ccna[at]gmail.com>',
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
register_options([
|
||||
Opt::RPORT(80),
|
||||
OptString.new('URI', [true, 'Specify the path to download the file (ex: admin.php)', '/admin.php']),
|
||||
OptString.new('PATH_SAVE', [true, 'The path to save the downloaded source code', '']),
|
||||
], self.class)
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(80),
|
||||
OptString.new('URI', [true, 'Specify the path to download the file (ex: admin.php)', '/admin.php']),
|
||||
OptString.new('PATH_SAVE', [true, 'The path to save the downloaded source code', '']),
|
||||
], self.class)
|
||||
|
||||
end
|
||||
|
||||
|
|
|
@ -109,7 +109,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
return :abort if (res.code == 404)
|
||||
srvhdr = res.headers['Server']
|
||||
if res.code == 200
|
||||
# Could go with res.headers["Server"] =~ /Apache-Coyote/i
|
||||
# Could go with res.headers['Server'] =~ /Apache-Coyote/i
|
||||
# as well but that seems like an element someone's more
|
||||
# likely to change
|
||||
success = true if(res.body.scan(/Tomcat/i).size >= 5)
|
||||
|
|
Loading…
Reference in New Issue