From 2bb498c4b3ba8a147f70d212c0d9907853b91659 Mon Sep 17 00:00:00 2001 From: Michael Schierl Date: Mon, 22 Oct 2012 20:04:21 +0200 Subject: [PATCH] DisclosureDate cleanup: Try parsing all dates Fix all dates unparsable by `Date.strptime(value, '%b %d %Y')` --- modules/exploits/windows/local/ask.rb | 2 +- modules/exploits/windows/local/bypassuac.rb | 2 +- modules/exploits/windows/local/service_permissions.rb | 2 +- modules/exploits/windows/smtp/wmailserver.rb | 2 +- modules/post/windows/escalate/bypassuac.rb | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/local/ask.rb b/modules/exploits/windows/local/ask.rb index 88b377e56d..95009ac41d 100644 --- a/modules/exploits/windows/local/ask.rb +++ b/modules/exploits/windows/local/ask.rb @@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Local 'References' => [ [ 'URL', 'http://www.room362.com/blog/2012/1/3/uac-user-assisted-compromise.html' ] ], - 'DisclosureDate'=> "Jan 3, 2012" + 'DisclosureDate'=> "Jan 3 2012" )) register_options([ diff --git a/modules/exploits/windows/local/bypassuac.rb b/modules/exploits/windows/local/bypassuac.rb index f919f9b3c8..3788b2c7ee 100644 --- a/modules/exploits/windows/local/bypassuac.rb +++ b/modules/exploits/windows/local/bypassuac.rb @@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Local 'References' => [ [ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] ], - 'DisclosureDate'=> "Dec 31, 2010" + 'DisclosureDate'=> "Dec 31 2010" )) end diff --git a/modules/exploits/windows/local/service_permissions.rb b/modules/exploits/windows/local/service_permissions.rb index a4e7fe8da9..cc1733a38e 100644 --- a/modules/exploits/windows/local/service_permissions.rb +++ b/modules/exploits/windows/local/service_permissions.rb @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Local [ 'Automatic', { } ], ], 'DefaultTarget' => 0, - 'DisclosureDate'=> "Oct 15, 2012" + 'DisclosureDate'=> "Oct 15 2012" )) register_options([ diff --git a/modules/exploits/windows/smtp/wmailserver.rb b/modules/exploits/windows/smtp/wmailserver.rb index ab89caf331..50b342259e 100644 --- a/modules/exploits/windows/smtp/wmailserver.rb +++ b/modules/exploits/windows/smtp/wmailserver.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ], ], 'DefaultTarget' => 0, - 'DisclosureDate' => 'Jul 11 2005 ')) + 'DisclosureDate' => 'Jul 11 2005')) register_options([ Opt::RPORT(25) ], self.class) end diff --git a/modules/post/windows/escalate/bypassuac.rb b/modules/post/windows/escalate/bypassuac.rb index d6fde61719..06ef199e58 100644 --- a/modules/post/windows/escalate/bypassuac.rb +++ b/modules/post/windows/escalate/bypassuac.rb @@ -30,7 +30,7 @@ class Metasploit3 < Msf::Post 'References' => [ [ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] ], - 'DisclosureDate'=> "Dec 31, 2010" + 'DisclosureDate'=> "Dec 31 2010" )) register_options([