Unpolluting SVN Revision keyword

Sometimes Revision keywords get expanded, too. Fix those.
unstable
Tod Beardsley 2012-03-01 16:59:54 -06:00
parent 3626d48db2
commit 302853f5a4
38 changed files with 38 additions and 38 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'ContentKeeper Web Appliance mimencode File Access',
'Version' => '$Revision: 14288 $',
'Version' => '$Revision$',
'Description' => %q{
This module abuses the 'mimencode' binary present within
ContentKeeper Web filtering appliances to retrieve arbitrary

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat Administration Tool Default Access',
'Version' => '$Revision: 13394 $',
'Version' => '$Revision$',
'Description' => 'Detect the Tomcat administration interface.',
'References' =>
[

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
'Version' => '$Revision: 14288 $',
'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
'Version' => '$Revision: 14288 $',
'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 14735 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP SSL Certificate Checker',
'Version' => '$Revision: 11796 $',
'Version' => '$Revision$',
'Author' => 'nebulus',
'License' => MSF_LICENSE,
'Description' => %q{

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
'Version' => '$Revision: 14532 $',
'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in versions of Cisco Network Access Manager 4.8.x You may wish to change

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -41,7 +41,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'OSVDB', '54555' ],
[ 'BID', '34993' ],
],
'Version' => '$Revision: 14034 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 14288 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'FrontPage Server Extensions Login Utility',
'Version' => '$Revision: 12623 $',
'Version' => '$Revision$',
'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.',
'References' =>
[

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Version Detection',
'Version' => '$Revision: 14597 $',
'Version' => '$Revision$',
'Description' => 'Display version information about each system',
'Author' => 'hdm',
'License' => MSF_LICENSE

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 10394 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
requires either Basic, Digest or NTLM authentication.
},
'Author' => [ 'et', 'patrick' ],
'Version' => '$Revision: 14034 $',
'Version' => '$Revision$',
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'HTTP Open Proxy Detection',
'Version' => '$Revision: 14316 $',
'Version' => '$Revision$',
'Description' => %q{
Checks if an HTTP proxy is open. False positive are avoided
verifing the HTTP return code and matching a pattern.

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Options Detection',
'Version' => '$Revision: 12623 $',
'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'],
'License' => MSF_LICENSE,

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Robots.txt Content Scanner',
'Version' => '$Revision: 13183 $',
'Version' => '$Revision$',
'Description' => 'Detect robots.txt files and analize its content',
'Author' => ['et'],
'License' => MSF_LICENSE

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 14560 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 14252 $',
'Version' => '$Revision$',
'References' =>
[
['URL', 'http://sqlmap.sourceforge.net'],

View File

@ -23,7 +23,7 @@ class Metasploit4 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP SSL Certificate Information',
'Version' => '$Revision: 14319 $',
'Version' => '$Revision$',
'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm',
'Author' =>
[

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Subversion Scanner',
'Version' => '$Revision: 11796 $',
'Version' => '$Revision$',
'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported',
'Author' => ['et'],
'License' => MSF_LICENSE

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP TRACE Detection',
'Version' => '$Revision: $',
'Version' => '$Revision$',
'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is',
'Author' => ['CG'],
'License' => MSF_LICENSE

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP trace.axd Content Scanner',
'Version' => '$Revision: 11796 $',
'Version' => '$Revision$',
'Description' => 'Detect trace.axd files and analize its content',
'Author' => ['c4an'],
'License' => MSF_LICENSE

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -37,7 +37,7 @@ require 'cgi'
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Internal IP Scanner',
'Version' => '$Revision: 14137 $',
'Version' => '$Revision$',
'Description' => 'Detect webservers internal IPs though WebDAV',
'Author' => ['et'],
'License' => MSF_LICENSE

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Scanner',
'Version' => '$Revision: 14527 $',
'Version' => '$Revision$',
'Description' => 'Detect webservers with WebDAV enabled',
'Author' => ['et'],
'License' => MSF_LICENSE

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Website Content Scanner',
'Version' => '$Revision: 14067 $',
'Version' => '$Revision$',
'Description' => 'Detect webservers disclosing its content though WebDAV',
'Author' => ['et'],
'License' => MSF_LICENSE

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 13983 $'))
'Version' => '$Revision$'))
register_options(
[